Jump to content
Not connected, Your IP: 52.14.0.24

Search the Community

Showing results for tags 'AirVPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 194 results

  1. Hello, It seems AirVPN client is not compatible with standard RPi2 Debian. After install it's not possible to launch AirVVPN client, it just closes. Log: http://pastebin.com/N4sxfg2v Mono version: Mono JIT compiler version 3.2.8 (Debian 3.2.8+dfsg-10) Copyright © 2002-2014 Novell, Inc, Xamarin Inc and Contributors. www.mono-project.comTLS: __threadSIGSEGV: normalNotifications: epollArchitecture: armel,vfp+hardDisabled: noneMisc: softdebug LLVM: supported, not enabled.GC: sgen
  2. Hello! I found an issue... When using the Testpage of AirVPN for DNS- and WebRTC-Leaks (www.ipleak.net) it's actually not showing WebRTC-Leaks, although they are there! Under circumstances this can cause serious trouble for the VPN-Users, because when they don't see any leaks, most of them will be sure that there are no leaks - but that can be very false! I discovered clear WebRTC-Leaks on a Windows7-machine + up-to-date Firefox; but ipleak.net only showed me the internal IP leaks! (which are actually not dangerous) I opened 2 Firefox-Windows while connected to a AirVPN-Server and while ipleak.net didn't show real-IP leaks, at the same moment another site clearly showed these WebRTC-leaks (GitHub)! As you can see on the screenshot ipleak.net doesn't show anything suspicious, but Github shows all the leaks including my real Provider-IP + all internal Network IP's; so actually EVERYTHING was leaking and totally broke the anonymity of AirVPN in my Browser! Now I want to know why ipleak.net provides WebRTC-leak-detecion, when it actually not working at all (also tested on Linux!) Try it yourself and you will see what I mean: 1. https://ipleak.net/ 2. https://diafygi.github.io/webrtc-ips/ Please also check my screenshot below! Btw. you can fix that leak easily in your Firefox-Settings! Answers are welcome! regards, me
  3. I understand this is vpn site it would be nice to view the forums and customer pages from an onion address. for the privacy minded folks out there who use tor and vpn together and would like to avoid bad tor exit nodes it would not be to hard for air admins to set this up. installing tor on server is very easy thanks!
  4. Hi, the port forwarding feature caught my attention but I have some doubts. I think I'm completely lost with this. Let's say I have a server running Linux, basically serving a webpage, I have port forwarding enabled on my router so anyone with my external IP address can connect to it. Okay now let's say I don't want to give out my real IP address, if I understand how the VPN port forwarding feature works, I could use a VPN server to serve that webpage and hide my real IP address (I'd have to deactivate port forwarding on my router and configure it with AirVPN) Is that right? So I connect that Linux server through OpenVPN to an AirVPN's server with port forwarding enabled. For a VPN server, which is a single IP address, there could be maybe 50 persons connected to it, we're sharing the server somehow, but those persons could also enable port forwarding, so, what are the limits/ranges? Two different persons on the same server can't port forward a same port? How does it work? Thanks
  5. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  6. Hello ! So they let me out of my cell today, which means I have a lot of pent-up nitpicking energy stored, haha ​At the bottom of this post, there's a respectful critique of how Air handles the explaining of this service to newcomers and my proposed solution. My main arguments for improving the Air service are: - This post about new-people seemingly not feeling welcome. - And this post about Community Mods & more interaction from Air. As the subtext to this forum reads: "Have some feedback and input to share? Don't be shy and drop us a note. We want to hear from you and strive to make our service better and more user friendly for our guests and members alike." So as they say, Challenge Accepted, Good Sir. Time to unleash my inner OCD pokemon! - Introduction & explaining the madness I'd like to post a series of things which I think need some changes; such as the spelling & grammar of various posts. I understand if English isn't the native language of various Staff members and that's fine; that's why I'd like to lend a helping hand. I don't know if it would be wiser to post all this in a support ticket, because it can amount to a lot of content and perhaps by making it public, more people can contribute and then we can keep it nicely organised in one place. I realise it can sound very condescending, patronizing and/or rude to suggest changes in spelling & grammar, so to be clear, it's just because I currently have an urge to help out; I have the utmost respect for AirVPN Staff & those which contribute positively to the community :]. Why does it matter how things are spelled and such? Because appearances, user-friendliness & attention to detail matter, both in terms of technical subjects and non-technical subjects. When I first started, I thought some of the how-tos could use some slight changes, because it was sometimes massively confusing to juggle the technical explanations with the sometimes unclear or vague wording that accompanied them. I like to think that it's AirVPNs attention to security & privacy details which make it so great; so why should the presentational details of the site be any different? :]. I hope it'll be satisfactory & easy for the Air Staff to just copy/paste the corrected texts in, if they decide to make use of them. I'll of course not change the spirit/content of anything. If you have any input, please feel free to make a post. These are just corrections based on what I think sounds right; we're all different :]. I'd like it if the Staff could clarify something in the "About Us" section. Blue text = My changes/corrections. (Sometimes the original isn't wrong, but could just be clearer, hence changes). Red text = The item should be deleted. (In my humble opinion, thank you) Main AirVPN Pages This should cover the entire AirVPN site, except individual posts in the FAQ and the much-dread ToS - Mission Page Corrections - Technical Specs Page Corrections - About Us Page Corrections I'm not sure what was trying to be expressed at the bottom of the article regarding "harsh contrasts against a project of sharing data, etc. etc." Can someone elaborate? Was there some sort of cross-VPN provider cooperation, wherein user data was or was going to be shared? Or was it meant to say that AirVPN was the opposite of all the other providers? Also, I suggest removing the very last bit "(we'll have some news on that probably within the first half of 2013)." since that's quite old and perhaps shouldn't be on an "About Us" page . - Plans Page Corrections "Accepted" sounds much more natural to me than "Allowed" Payment Processors. Oh and the period at the end of Free Trial access should go away too, in order to conform with the other headings. Also, on the Enter page, it's not called OS X anymore, as Apple renamed it MacOS. - Ping Matrix Page Corrections I'm not sure I understand this one correctly. Please say so, if that's the case. - Top Users Page Corrections - Config Generator "More Help" Page Corrections I'm not sure what's meant by "unique download" here. Unique zip archives for each file maybe? - Websites Support Page Corrections - Databases Page Corrections - Client Software Platforms / Environment Pages Corrections - Privacy Notice and Terms Page Corrections I assume it really was "extra-EU" and not "extra-UE". If not, what's UE? I hope it's okay I skip the ToS Explanatory Posts Here's where I would like to say something. A slight critique. I'm really glad that Air Staff have taken the time to put up such nice FAQs.I'm likewise also really glad that they're extremely knowledgeable and can explain things in a technical way.However... As I also said in my new users guide, the main problem with Air is that it's too technical, when it's not needed. This is GREAT for IT-people, but not everyone else.I mean, it's fine to be technical. But I would like to see it either be "toned down" a little in some places, such as the FAQs, where it's very likely that new people will go or:Alternatively, one could provide non-technical explanations alongside the technical ones. Perhaps in spoilers? I LOVE spoilers lol.Case in point, in the FAQ titled "What is a VPN?". The explanations are great and for technical people, it's borderline pornography. But really, if someone doesn't know what a VPN even is, what are the odds of them understanding what things like this mean: I genuinely think that most new users, especially those who don't have an interest in IT, will have a seizure. An FAQ is, I think, meant to leave people with less questions, not more of them. After reading that, I'm sure many would be asking things like: What's a default gateway push? Is it dangerous?What's encapsulation?What's UDP & TCP?Which stream? Twitch.com?HTTP? Socks? Proxy???I of course don't want to sacrifice form or function for the sake of making things ultra-easy for everyone. We can hang a sign on the door saying "Brain Required" if you wish. But it has to be said that attention to things like this, helps us all in one way or another. Air draws in more customers, which means one of the best VPNs gets to keep running. More people see what a quality VPN service is like & perhaps more services like Air will appear. Likewise, more people protected on the internet is a good thing in general. Plus, all the hardwork & passion Air Staff put into this excellent service, won't mean a thing if no one knows how to use it; that's just a fact really. Our aim, in my view, should be to make the service as welcoming as possible, without sacrificing the aforementioned form or function; which is also one of the biggest problems with modern encryption & thus a barrier to mass-adoption. After all, then there'd be no excuse for people to not use AirVPN and we can finally call them on their bluff eh - Original Text - Attempted Example Of Simplified Text What do you think? Sure, it's missing some details and maybe it's not all that accurate, but if it gets the main point across, so what? As I said, we could just make spoilers for both versions. If Air wants, I'll gladly help make more of such explanations for the other things, since I'm quite good at doing so; mainly because I hardly understand it myself lmao, but shhh Thank you for reading and as always, Thank you to AirVPN & Staff for providing this excellent service, as well as the AirVPN community for keeping this place going strong ! I want to know one thing: has Air got any plans on translating the service into different languages? I think it would be so great if they crowd-sourced this. Anyhow, if you spot anything I missed or disagree with a correction, feel free to tell me! Thanks. Now if you'll excuse me, my bed misses me, lol.
  7. Hello, recently since like 1 or 1.5 week my airvpn is having strange behaviour. It now and then suddenly disconnects, and then needs to reconnect / authorize again. Somehow it doesnt feel natural / a pc conflict this problem but i could be wrong. Maybe its important, but these logs no one changed anything like settings not on the network and not on my laptop. The first 2 disconnects i was sleeping, so no user activity on the laptop as well. last disconnect i was browsing. . 2016.07.15 23:11:45 - Systems & servers data update completed . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:23:44 - OpenVPN > Validating certificate key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:23:44 - OpenVPN > VERIFY KU OK . 2016.07.15 23:23:44 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:23:44 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:00 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060) . 2016.07.15 23:40:00 - OpenVPN > Connection reset, restarting [-1] . 2016.07.15 23:40:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.15 23:40:00 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.15 23:40:00 - Disconnecting . 2016.07.15 23:40:00 - Management - Send 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.15 23:40:00 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.15 23:40:00 - OpenVPN > Exiting due to fatal error . 2016.07.15 23:40:01 - Connection terminated. I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:21 - Checking authorization ... ! 2016.07.15 23:40:21 - Connecting to Azmidiske (Sweden, Uppsala) . 2016.07.15 23:40:21 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.15 23:40:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.15 23:40:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.15 23:40:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.15 23:40:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.15 23:40:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.141:443 [nonblock] . 2016.07.15 23:40:23 - OpenVPN > TCP connection established with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.141:443, sid=f51e2740 2526a036 . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:40:23 - OpenVPN > Validating certificate key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:40:23 - OpenVPN > VERIFY KU OK . 2016.07.15 23:40:23 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:40:23 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.15 23:40:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.224 255.255.0.0' . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.15 23:40:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.15 23:40:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.15 23:40:28 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.15 23:40:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.15 23:40:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.224/255.255.0.0 [sUCCEEDED] . 2016.07.15 23:40:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.224/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.15 23:40:28 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.15 23:40:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.141 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:34 - Starting Management Interface . 2016.07.15 23:40:34 - OpenVPN > Initialization Sequence Completed I 2016.07.15 23:40:34 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:34 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:34 - Flushing DNS I 2016.07.15 23:40:35 - Checking DNS ! 2016.07.15 23:40:36 - Connected. . 2016.07.15 23:40:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.15 23:40:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.15 23:42:20 - Updating systems & servers data ... . 2016.07.15 23:42:21 - Systems & servers data update completed . 2016.07.16 00:12:56 - Updating systems & servers data ... . 2016.07.16 00:12:57 - Systems & servers data update completed . 2016.07.16 00:40:25 - OpenVPN > TLS: soft reset sec=0 bytes=1306479/0 pkts=4397/0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 00:40:26 - OpenVPN > Validating certificate key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY KU OK . 2016.07.16 00:40:26 - OpenVPN > Validating certificate extended key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 00:40:26 - OpenVPN > VERIFY EKU OK . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 00:43:32 - Updating systems & servers data ... . 2016.07.16 00:43:33 - Systems & servers data update completed . 2016.07.16 01:13:50 - Updating systems & servers data ... . 2016.07.16 01:13:52 - Systems & servers data update completed I 2016.07.16 01:40:25 - Renewing TLS key . 2016.07.16 01:40:25 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 01:40:27 - OpenVPN > TLS: soft reset sec=0 bytes=14841430/0 pkts=38149/0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 01:40:27 - OpenVPN > Validating certificate key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY KU OK . 2016.07.16 01:40:27 - OpenVPN > Validating certificate extended key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 01:40:27 - OpenVPN > VERIFY EKU OK . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 01:44:32 - Updating systems & servers data ... . 2016.07.16 01:44:34 - Systems & servers data update completed . 2016.07.16 02:14:41 - Updating systems & servers data ... . 2016.07.16 02:14:42 - Systems & servers data update completed I 2016.07.16 02:40:27 - Renewing TLS key . 2016.07.16 02:40:27 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 02:40:28 - OpenVPN > TLS: soft reset sec=0 bytes=24638897/0 pkts=53803/0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 02:40:28 - OpenVPN > Validating certificate key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY KU OK . 2016.07.16 02:40:28 - OpenVPN > Validating certificate extended key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 02:40:28 - OpenVPN > VERIFY EKU OK . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 02:44:44 - Updating systems & servers data ... . 2016.07.16 02:44:46 - Systems & servers data update completed . 2016.07.16 03:15:37 - Updating systems & servers data ... . 2016.07.16 03:15:39 - Systems & servers data update completed I 2016.07.16 03:40:28 - Renewing TLS key . 2016.07.16 03:40:28 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 03:40:29 - OpenVPN > TLS: soft reset sec=0 bytes=11152806/0 pkts=38076/0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 03:40:29 - OpenVPN > Validating certificate key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY KU OK . 2016.07.16 03:40:29 - OpenVPN > Validating certificate extended key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 03:40:29 - OpenVPN > VERIFY EKU OK . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 03:46:14 - Updating systems & servers data ... . 2016.07.16 03:46:16 - Systems & servers data update completed . 2016.07.16 04:16:50 - Updating systems & servers data ... . 2016.07.16 04:16:51 - Systems & servers data update completed I 2016.07.16 04:40:29 - Renewing TLS key . 2016.07.16 04:40:29 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 04:40:30 - OpenVPN > Validating certificate key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 04:40:30 - OpenVPN > VERIFY KU OK . 2016.07.16 04:40:30 - OpenVPN > Validating certificate extended key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 04:40:30 - OpenVPN > VERIFY EKU OK . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 04:47:30 - Updating systems & servers data ... . 2016.07.16 04:47:31 - Systems & servers data update completed . 2016.07.16 05:18:05 - Updating systems & servers data ... . 2016.07.16 05:18:06 - Systems & servers data update completed I 2016.07.16 05:40:30 - Renewing TLS key . 2016.07.16 05:40:30 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 05:40:31 - OpenVPN > Validating certificate key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 05:40:31 - OpenVPN > VERIFY KU OK . 2016.07.16 05:40:31 - OpenVPN > Validating certificate extended key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 05:40:31 - OpenVPN > VERIFY EKU OK . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 05:48:36 - Updating systems & servers data ... . 2016.07.16 05:48:37 - Systems & servers data update completed . 2016.07.16 06:19:12 - Updating systems & servers data ... . 2016.07.16 06:19:13 - Systems & servers data update completed I 2016.07.16 06:40:31 - Renewing TLS key . 2016.07.16 06:40:31 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 06:40:32 - OpenVPN > Validating certificate key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 06:40:32 - OpenVPN > VERIFY KU OK . 2016.07.16 06:40:32 - OpenVPN > Validating certificate extended key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 06:40:32 - OpenVPN > VERIFY EKU OK . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 06:49:47 - Updating systems & servers data ... . 2016.07.16 06:49:48 - Systems & servers data update completed . 2016.07.16 07:20:23 - Updating systems & servers data ... . 2016.07.16 07:20:24 - Systems & servers data update completed I 2016.07.16 07:40:32 - Renewing TLS key . 2016.07.16 07:40:32 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 07:40:34 - OpenVPN > TLS: soft reset sec=0 bytes=5686342/0 pkts=37009/0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 07:40:34 - OpenVPN > Validating certificate key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY KU OK . 2016.07.16 07:40:34 - OpenVPN > Validating certificate extended key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 07:40:34 - OpenVPN > VERIFY EKU OK . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 07:50:59 - Updating systems & servers data ... . 2016.07.16 07:51:00 - Systems & servers data update completed . 2016.07.16 08:21:35 - Updating systems & servers data ... . 2016.07.16 08:21:37 - Systems & servers data update completed I 2016.07.16 08:40:34 - Renewing TLS key . 2016.07.16 08:40:34 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 08:40:35 - OpenVPN > Validating certificate key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 08:40:35 - OpenVPN > VERIFY KU OK . 2016.07.16 08:40:35 - OpenVPN > Validating certificate extended key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 08:40:35 - OpenVPN > VERIFY EKU OK . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 08:52:12 - Updating systems & servers data ... . 2016.07.16 08:52:13 - Systems & servers data update completed . 2016.07.16 09:22:46 - Updating systems & servers data ... . 2016.07.16 09:22:47 - Systems & servers data update completed I 2016.07.16 09:40:35 - Renewing TLS key . 2016.07.16 09:40:35 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 09:40:36 - OpenVPN > Validating certificate key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 09:40:36 - OpenVPN > VERIFY KU OK . 2016.07.16 09:40:36 - OpenVPN > Validating certificate extended key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 09:40:36 - OpenVPN > VERIFY EKU OK . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 09:53:22 - Updating systems & servers data ... . 2016.07.16 09:53:23 - Systems & servers data update completed . 2016.07.16 10:23:58 - Updating systems & servers data ... . 2016.07.16 10:23:58 - Systems & servers data update completed I 2016.07.16 10:40:36 - Renewing TLS key . 2016.07.16 10:40:36 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 10:40:37 - OpenVPN > TLS: soft reset sec=0 bytes=258557956/0 pkts=300692/0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:40:37 - OpenVPN > Validating certificate key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY KU OK . 2016.07.16 10:40:37 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:40:37 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:33 - Updating systems & servers data ... . 2016.07.16 10:54:36 - OpenVPN > Connection reset, restarting [-1] . 2016.07.16 10:54:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.16 10:54:36 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.16 10:54:36 - Disconnecting . 2016.07.16 10:54:36 - Management - Send 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.16 10:54:36 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.16 10:54:36 - OpenVPN > Exiting due to fatal error . 2016.07.16 10:54:37 - Connection terminated. . 2016.07.16 10:54:37 - Systems & servers data update completed I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:54:50 - Checking authorization ... ! 2016.07.16 10:54:50 - Connecting to Algieba (Sweden, Uppsala) . 2016.07.16 10:54:51 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.16 10:54:51 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.16 10:54:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.16 10:54:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.16 10:54:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.16 10:54:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.16 10:54:52 - OpenVPN > TCP connection established with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=d15a8dca c995bc1d . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:54:52 - OpenVPN > Validating certificate key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:54:52 - OpenVPN > VERIFY KU OK . 2016.07.16 10:54:52 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:54:52 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.16 10:54:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.190 255.255.0.0' . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.16 10:54:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.16 10:54:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.16 10:54:57 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.16 10:54:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.16 10:54:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.190/255.255.0.0 [sUCCEEDED] . 2016.07.16 10:54:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.190/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.16 10:54:57 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.16 10:55:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - Starting Management Interface . 2016.07.16 10:55:02 - OpenVPN > Initialization Sequence Completed I 2016.07.16 10:55:02 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:55:02 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:55:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.16 10:55:03 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:55:03 - Flushing DNS I 2016.07.16 10:55:04 - Checking DNS ! 2016.07.16 10:55:05 - Connected. . 2016.07.16 10:55:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.16 10:55:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.16 11:25:14 - Updating systems & servers data ... . 2016.07.16 11:25:17 - Systems & servers data update completed . 2016.07.16 11:54:54 - OpenVPN > TLS: soft reset sec=0 bytes=141395814/0 pkts=215960/0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 11:54:54 - OpenVPN > Validating certificate key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY KU OK . 2016.07.16 11:54:54 - OpenVPN > Validating certificate extended key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 11:54:54 - OpenVPN > VERIFY EKU OK . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 11:55:51 - Updating systems & servers data ... . 2016.07.16 11:55:52 - Systems & servers data update completed . 2016.07.16 12:26:30 - Updating systems & servers data ... . 2016.07.16 12:26:31 - Systems & servers data update completed I 2016.07.16 12:54:54 - Renewing TLS key . 2016.07.16 12:54:54 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 12:54:55 - OpenVPN > TLS: soft reset sec=0 bytes=272454219/0 pkts=360490/0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 12:54:55 - OpenVPN > Validating certificate key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY KU OK . 2016.07.16 12:54:55 - OpenVPN > Validating certificate extended key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 12:54:55 - OpenVPN > VERIFY EKU OK . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 12:57:10 - Updating systems & servers data ... . 2016.07.16 12:57:11 - Systems & servers data update completed . 2016.07.16 13:27:56 - Updating systems & servers data ... . 2016.07.16 13:27:58 - Systems & servers data update completed I 2016.07.16 13:54:55 - Renewing TLS key . 2016.07.16 13:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 13:54:56 - OpenVPN > TLS: soft reset sec=0 bytes=150296496/0 pkts=248976/0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 13:54:56 - OpenVPN > Validating certificate key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY KU OK . 2016.07.16 13:54:56 - OpenVPN > Validating certificate extended key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 13:54:56 - OpenVPN > VERIFY EKU OK . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 13:58:48 - Updating systems & servers data ... . 2016.07.16 13:58:50 - Systems & servers data update completed . 2016.07.16 14:29:36 - Updating systems & servers data ... . 2016.07.16 14:29:37 - Systems & servers data update completed I 2016.07.16 14:54:56 - Renewing TLS key . 2016.07.16 14:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 14:54:57 - OpenVPN > TLS: soft reset sec=0 bytes=238603046/0 pkts=356017/0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 14:54:57 - OpenVPN > Validating certificate key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY KU OK . 2016.07.16 14:54:57 - OpenVPN > Validating certificate extended key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 14:54:57 - OpenVPN > VERIFY EKU OK . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 14:59:53 - Updating systems & servers data ... . 2016.07.16 14:59:54 - Systems & servers data update completed . 2016.07.16 15:30:02 - Updating systems & servers data ... . 2016.07.16 15:30:03 - Systems & servers data update completed I 2016.07.16 15:54:57 - Renewing TLS key . 2016.07.16 15:54:57 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 15:54:58 - OpenVPN > TLS: soft reset sec=0 bytes=70346271/0 pkts=148144/0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 15:54:58 - OpenVPN > Validating certificate key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY KU OK . 2016.07.16 15:54:58 - OpenVPN > Validating certificate extended key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 15:54:58 - OpenVPN > VERIFY EKU OK . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 16:00:35 - Updating systems & servers data ... . 2016.07.16 16:00:36 - Systems & servers data update completed . 2016.07.16 16:31:36 - Updating systems & servers data ... . 2016.07.16 16:31:37 - Systems & servers data update completed I 2016.07.16 16:54:58 - Renewing TLS key . 2016.07.16 16:54:58 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 16:55:00 - OpenVPN > TLS: soft reset sec=0 bytes=289003815/0 pkts=406451/0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 16:55:00 - OpenVPN > Validating certificate key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY KU OK . 2016.07.16 16:55:00 - OpenVPN > Validating certificate extended key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 16:55:00 - OpenVPN > VERIFY EKU OK . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 17:01:46 - Updating systems & servers data ... . 2016.07.16 17:01:48 - Systems & servers data update completed . 2016.07.16 17:32:07 - Updating systems & servers data ... . 2016.07.16 17:32:08 - Systems & servers data update completed I 2016.07.16 17:55:00 - Renewing TLS key . 2016.07.16 17:55:00 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 17:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=261338769/0 pkts=368887/0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 17:55:02 - OpenVPN > Validating certificate key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY KU OK . 2016.07.16 17:55:02 - OpenVPN > Validating certificate extended key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 17:55:02 - OpenVPN > VERIFY EKU OK . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 18:02:17 - Updating systems & servers data ... . 2016.07.16 18:02:21 - Systems & servers data update completed . 2016.07.16 18:33:01 - Updating systems & servers data ... . 2016.07.16 18:33:05 - Systems & servers data update completed I 2016.07.16 18:55:01 - Renewing TLS key . 2016.07.16 18:55:01 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 18:55:06 - OpenVPN > Validating certificate key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 18:55:06 - OpenVPN > VERIFY KU OK . 2016.07.16 18:55:06 - OpenVPN > Validating certificate extended key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 18:55:06 - OpenVPN > VERIFY EKU OK . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 19:03:29 - Updating systems & servers data ... . 2016.07.16 19:03:33 - Systems & servers data update completed . 2016.07.16 19:34:20 - Updating systems & servers data ... . 2016.07.16 19:34:21 - Systems & servers data update completed I 2016.07.16 19:55:06 - Renewing TLS key . 2016.07.16 19:55:06 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 19:55:08 - OpenVPN > Validating certificate key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 19:55:08 - OpenVPN > VERIFY KU OK . 2016.07.16 19:55:08 - OpenVPN > Validating certificate extended key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 19:55:08 - OpenVPN > VERIFY EKU OK . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 20:04:20 - Updating systems & servers data ... . 2016.07.16 20:04:22 - Systems & servers data update completed . 2016.07.16 20:34:41 - Updating systems & servers data ... . 2016.07.16 20:34:43 - Systems & servers data update completed I 2016.07.16 20:55:08 - Renewing TLS key . 2016.07.16 20:55:08 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 20:55:10 - OpenVPN > TLS: soft reset sec=0 bytes=299919922/0 pkts=402243/0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 20:55:10 - OpenVPN > Validating certificate key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY KU OK . 2016.07.16 20:55:10 - OpenVPN > Validating certificate extended key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 20:55:10 - OpenVPN > VERIFY EKU OK . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 21:04:51 - Updating systems & servers data ... . 2016.07.16 21:04:56 - Systems & servers data update completed . 2016.07.16 21:35:14 - Updating systems & servers data ... . 2016.07.16 21:35:15 - Systems & servers data update completed I 2016.07.16 21:55:10 - Renewing TLS key . 2016.07.16 21:55:10 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 21:55:12 - OpenVPN > TLS: soft reset sec=0 bytes=325518219/0 pkts=430958/0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 21:55:12 - OpenVPN > Validating certificate key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY KU OK . 2016.07.16 21:55:12 - OpenVPN > Validating certificate extended key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 21:55:12 - OpenVPN > VERIFY EKU OK . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 22:06:16 - Updating systems & servers data ... . 2016.07.16 22:06:18 - Systems & servers data update completed . 2016.07.16 22:37:05 - Updating systems & servers data ... . 2016.07.16 22:37:18 - Systems & servers data update completed I 2016.07.16 22:55:12 - Renewing TLS key . 2016.07.16 22:55:12 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 22:55:14 - OpenVPN > TLS: soft reset sec=0 bytes=269122759/0 pkts=379891/0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 22:55:14 - OpenVPN > Validating certificate key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY KU OK . 2016.07.16 22:55:14 - OpenVPN > Validating certificate extended key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 22:55:14 - OpenVPN > VERIFY EKU OK . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 23:07:35 - Updating systems & servers data ... . 2016.07.16 23:07:36 - Systems & servers data update completed . 2016.07.16 23:38:31 - Updating systems & servers data ... . 2016.07.16 23:38:33 - Systems & servers data update completed I 2016.07.16 23:55:14 - Renewing TLS key . 2016.07.16 23:55:14 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 23:55:18 - OpenVPN > Validating certificate key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 23:55:18 - OpenVPN > VERIFY KU OK . 2016.07.16 23:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 23:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 00:08:51 - Updating systems & servers data ... . 2016.07.17 00:08:59 - Systems & servers data update completed . 2016.07.17 00:39:42 - Updating systems & servers data ... . 2016.07.17 00:39:43 - Systems & servers data update completed I 2016.07.17 00:55:16 - Renewing TLS key . 2016.07.17 00:55:16 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 00:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 00:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 00:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 00:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 01:10:19 - Updating systems & servers data ... . 2016.07.17 01:10:20 - Systems & servers data update completed . 2016.07.17 01:40:53 - Updating systems & servers data ... . 2016.07.17 01:40:54 - Systems & servers data update completed . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 01:55:15 - OpenVPN > Validating certificate key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 01:55:15 - OpenVPN > VERIFY KU OK . 2016.07.17 01:55:15 - OpenVPN > Validating certificate extended key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 01:55:15 - OpenVPN > VERIFY EKU OK . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 02:11:42 - Updating systems & servers data ... . 2016.07.17 02:11:44 - Systems & servers data update completed . 2016.07.17 02:42:39 - Updating systems & servers data ... . 2016.07.17 02:42:40 - Systems & servers data update completed I 2016.07.17 02:55:15 - Renewing TLS key . 2016.07.17 02:55:15 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 02:55:17 - OpenVPN > TLS: soft reset sec=0 bytes=194567558/0 pkts=272952/0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 02:55:17 - OpenVPN > Validating certificate key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY KU OK . 2016.07.17 02:55:17 - OpenVPN > Validating certificate extended key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 02:55:17 - OpenVPN > VERIFY EKU OK . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 03:13:09 - Updating systems & servers data ... . 2016.07.17 03:13:11 - Systems & servers data update completed . 2016.07.17 03:44:32 - Updating systems & servers data ... . 2016.07.17 03:44:39 - Systems & servers data update completed I 2016.07.17 03:55:17 - Renewing TLS key . 2016.07.17 03:55:17 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 03:55:18 - OpenVPN > TLS: soft reset sec=0 bytes=1165265937/0 pkts=1309392/0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 03:55:18 - OpenVPN > Validating certificate key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY KU OK . 2016.07.17 03:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 03:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 04:14:58 - Updating systems & servers data ... . 2016.07.17 04:14:59 - Systems & servers data update completed . 2016.07.17 04:45:21 - Updating systems & servers data ... . 2016.07.17 04:45:23 - Systems & servers data update completed I 2016.07.17 04:55:18 - Renewing TLS key . 2016.07.17 04:55:18 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 04:55:19 - OpenVPN > TLS: soft reset sec=0 bytes=233301899/0 pkts=328699/0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 04:55:19 - OpenVPN > Validating certificate key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY KU OK . 2016.07.17 04:55:19 - OpenVPN > Validating certificate extended key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 04:55:19 - OpenVPN > VERIFY EKU OK . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 05:15:32 - Updating systems & servers data ... . 2016.07.17 05:15:34 - Systems & servers data update completed . 2016.07.17 05:45:51 - Updating systems & servers data ... . 2016.07.17 05:45:52 - Systems & servers data update completed I 2016.07.17 05:55:19 - Renewing TLS key . 2016.07.17 05:55:19 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 05:55:20 - OpenVPN > TLS: soft reset sec=0 bytes=212919884/0 pkts=266892/0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 05:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 05:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 05:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 06:16:10 - Updating systems & servers data ... . 2016.07.17 06:16:11 - Systems & servers data update completed . 2016.07.17 06:46:25 - Updating systems & servers data ... . 2016.07.17 06:46:26 - Systems & servers data update completed I 2016.07.17 06:55:20 - Renewing TLS key . 2016.07.17 06:55:20 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 06:55:21 - OpenVPN > TLS: soft reset sec=0 bytes=213225290/0 pkts=259269/0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 06:55:21 - OpenVPN > Validating certificate key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY KU OK . 2016.07.17 06:55:21 - OpenVPN > Validating certificate extended key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 06:55:21 - OpenVPN > VERIFY EKU OK . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 07:16:38 - Updating systems & servers data ... . 2016.07.17 07:16:39 - Systems & servers data update completed . 2016.07.17 07:46:52 - Updating systems & servers data ... . 2016.07.17 07:46:54 - Systems & servers data update completed I 2016.07.17 07:55:21 - Renewing TLS key . 2016.07.17 07:55:21 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 07:55:22 - OpenVPN > TLS: soft reset sec=0 bytes=236101110/0 pkts=319176/0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 07:55:22 - OpenVPN > Validating certificate key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY KU OK . 2016.07.17 07:55:22 - OpenVPN > Validating certificate extended key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 07:55:22 - OpenVPN > VERIFY EKU OK . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 08:17:02 - Updating systems & servers data ... . 2016.07.17 08:17:03 - Systems & servers data update completed . 2016.07.17 08:48:09 - Updating systems & servers data ... . 2016.07.17 08:48:10 - Systems & servers data update completed I 2016.07.17 08:55:22 - Renewing TLS key . 2016.07.17 08:55:22 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 08:55:23 - OpenVPN > TLS: soft reset sec=0 bytes=252179535/0 pkts=365885/0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 08:55:23 - OpenVPN > Validating certificate key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY KU OK . 2016.07.17 08:55:23 - OpenVPN > Validating certificate extended key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 08:55:23 - OpenVPN > VERIFY EKU OK . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 09:19:02 - Updating systems & servers data ... . 2016.07.17 09:19:03 - Systems & servers data update completed . 2016.07.17 09:49:27 - Updating systems & servers data ... . 2016.07.17 09:49:30 - Systems & servers data update completed I 2016.07.17 09:55:23 - Renewing TLS key . 2016.07.17 09:55:23 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 09:55:24 - OpenVPN > TLS: soft reset sec=0 bytes=250581123/0 pkts=320129/0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 09:55:24 - OpenVPN > Validating certificate key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY KU OK . 2016.07.17 09:55:24 - OpenVPN > Validating certificate extended key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 09:55:24 - OpenVPN > VERIFY EKU OK . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 10:20:00 - Updating systems & servers data ... . 2016.07.17 10:20:01 - Systems & servers data update completed . 2016.07.17 10:50:19 - Updating systems & servers data ... . 2016.07.17 10:50:20 - Systems & servers data update completed I 2016.07.17 10:55:24 - Renewing TLS key . 2016.07.17 10:55:24 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 10:55:25 - OpenVPN > TLS: soft reset sec=0 bytes=397505535/0 pkts=484501/0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 10:55:25 - OpenVPN > Validating certificate key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY KU OK . 2016.07.17 10:55:25 - OpenVPN > Validating certificate extended key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 10:55:25 - OpenVPN > VERIFY EKU OK . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:04:25 - OpenVPN > write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054) . 2016.07.17 11:04:25 - OpenVPN > Connection reset, restarting [-1] ! 2016.07.17 11:04:25 - Disconnecting . 2016.07.17 11:04:31 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.17 11:04:40 - OpenVPN > Restart pause, 5 second(s) . 2016.07.17 11:04:42 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:44 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:04:44 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.17 11:04:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.17 11:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:46 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:46 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:46 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:51 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:52 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Closing TUN/TAP interface . 2016.07.17 11:04:54 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.07.17 11:04:57 - Connection terminated. I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:05:42 - Checking authorization ... ! 2016.07.17 11:05:42 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.17 11:05:45 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.17 11:05:45 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.17 11:05:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.17 11:05:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.17 11:05:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:05:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.145:443 [nonblock] . 2016.07.17 11:05:46 - OpenVPN > TCP connection established with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=e4192879 ebb234b9 . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 11:05:47 - OpenVPN > Validating certificate key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 11:05:47 - OpenVPN > VERIFY KU OK . 2016.07.17 11:05:47 - OpenVPN > Validating certificate extended key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 11:05:47 - OpenVPN > VERIFY EKU OK . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:05:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.17 11:05:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.195 255.255.0.0' . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.17 11:05:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.17 11:05:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.17 11:05:53 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.17 11:05:53 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.17 11:05:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.195/255.255.0.0 [sUCCEEDED] . 2016.07.17 11:05:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.195/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.17 11:05:53 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.17 11:05:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.17 11:05:57 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:57 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:57 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:57 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:58 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:58 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - Starting Management Interface . 2016.07.17 11:05:58 - OpenVPN > Initialization Sequence Completed I 2016.07.17 11:05:58 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:59 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:59 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.17 11:06:00 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:06:01 - Flushing DNS I 2016.07.17 11:06:04 - Checking DNS ! 2016.07.17 11:06:07 - Connected. . 2016.07.17 11:06:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.17 11:06:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  8. As of a few days ago Netflix seems to be blocked when using any airvpn server from all apple platforms that I own ( iphone, ipad, appletv generation 2). If you try to access netflix from iphone and ipad theres only a generic error message about "unable to play the title". On appleTV generation 2&3 theres a specific error message: Netflix 139: NFErr_MC_Authfailure
  9. So, I have been informed by fellow classmates that the use of a VPN on public school wifi is considered a felony under US law under the charge of tampering with a government network. Is this true? How would this hold up in court?
  10. Hello, This is my first VPN - so far so good. The good - lots of servers! The bad - sometimes have to log on more than once. (rare) - I get a connection, but no internet. disconnect reconnect, I am usually good I installed the TAP9 adapter, but still for browser that have webrtc that can't be disabled - Chrome. My IP still comes through. Is that just a browser issue? Or can I do something about it. I do not like that!!!! Mr. V
  11. I'm trying to use the portable version (no mono) of the client on Linux Mint. When I try to connect to a server I get an error "OpenVPN is already running". I don't think I have anything running in background that would cause this message to appear. I have one more VPN client installed on my machine from other provider but I have to manually start it. I checked on System Monitor for processes with "vpn" in name and I didn't find anything. Do you know what may cause this and how to solve the issue?
  12. Hi, I have used so many month without any problem the AIRVPN client on ubuntu 14.04 Today I have this problem The client didn't connect. It remain on " Checking dns" and after change the server and again whith !checking dns" I have tred to reinstall client, restart, shutdown router...update ubuntu nothing going well....please help me. Note that I am new on linux Here is the log (i have put xxxx on ip ) I 2016.06.25 14:34:58 - AirVPN client version: 2.10.3 / x86, System: Linux, Name: Ubuntu 14.04.4 LTS \n \l / x86 . 2016.06.25 14:34:58 - Reading options from /home/jason/.airvpn/AirVPN.xml . 2016.06.25 14:35:01 - Data Path: /home/jason/.airvpn . 2016.06.25 14:35:01 - App Path: /usr/lib/AirVPN . 2016.06.25 14:35:01 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2016.06.25 14:35:01 - Command line arguments (1): path="/home/jason/.airvpn" . 2016.06.25 14:35:01 - Updating systems & servers data ... . 2016.06.25 14:35:01 - Operating System: Unix 3.19.0.62 - Linux jxxxxx-NF110-NF210-NF310 3.19.0-62-generic #70~14.04.1-Ubuntu SMP Mon Jun 13 16:30:45 UTC 2016 i686 i686 i686 GNU/Linux I 2016.06.25 14:35:02 - OpenVPN Driver - Found, /dev/net/tun I 2016.06.25 14:35:02 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2016.06.25 14:35:02 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2016.06.25 14:35:02 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4) ! 2016.06.25 14:35:02 - Activation of Network Lock - Linux IPTables . 2016.06.25 14:35:03 - Systems & servers data update completed I 2016.06.25 14:35:10 - Session starting. W 2016.06.25 14:35:11 - Unable to understand if IPV6 is active. I 2016.06.25 14:35:20 - Checking authorization ... ! 2016.06.25 14:35:20 - Connecting to Caph (Netherlands, Alblasserdam) . 2016.06.25 14:35:20 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2016.06.25 14:35:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.25 14:35:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.25 14:35:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:20 - OpenVPN > Socket Buffers: R=[163840->262144] S=[163840->262144] . 2016.06.25 14:35:20 - OpenVPN > UDPv4 link local: [undef] . 2016.06.25 14:35:20 - OpenVPN > UDPv4 link remote: [AF_INET]xxxxxxxxxxx:443 . 2016.06.25 14:35:20 - OpenVPN > TLS: Initial packet from [AF_INET]xxxxxxx:443, sid=1956d2fc 892e7873 . 2016.06.25 14:35:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.25 14:35:20 - OpenVPN > Validating certificate key usage . 2016.06.25 14:35:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.25 14:35:20 - OpenVPN > VERIFY KU OK . 2016.06.25 14:35:20 - OpenVPN > Validating certificate extended key usage . 2016.06.25 14:35:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.25 14:35:20 - OpenVPN > VERIFY EKU OK . 2016.06.25 14:35:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.25 14:35:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:35:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:35:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.06.25 14:35:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443 . 2016.06.25 14:35:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.25 14:35:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.210 255.255.0.0' . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.25 14:35:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlan0 HWADDR=00:1b:b1:a7:7b:88 . 2016.06.25 14:35:29 - OpenVPN > TUN/TAP device tun0 opened . 2016.06.25 14:35:29 - OpenVPN > TUN/TAP TX queue length set to 100 . 2016.06.25 14:35:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.25 14:35:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2016.06.25 14:35:29 - OpenVPN > /sbin/ip addr add dev tun0 10.4.27.210/16 broadcast 10.4.255.255 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add xxxxxxxx32 via xxx.xxx.1.1 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:35:34 - Starting Management Interface . 2016.06.25 14:35:34 - OpenVPN > Initialization Sequence Completed I 2016.06.25 14:35:34 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup I 2016.06.25 14:35:34 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) I 2016.06.25 14:35:34 - Flushing DNS I 2016.06.25 14:35:34 - Checking DNS W 2016.06.25 14:36:05 - The request timed out ! 2016.06.25 14:36:05 - Disconnecting . 2016.06.25 14:36:05 - Management - Send 'signal SIGTERM' . 2016.06.25 14:36:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.25 14:36:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.25 14:36:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.25 14:36:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del xxxx.x.xxx.xxxx/32 . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2016.06.25 14:36:10 - Connection terminated. . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del 128.0.0.0/1 I 2016.06.25 14:36:10 - DNS of the system restored to original settings (Rename method) . 2016.06.25 14:36:10 - OpenVPN > Closing TUN/TAP interface . 2016.06.25 14:36:11 - OpenVPN > /sbin/ip addr del dev tun0 10.4.27.210/16 . 2016.06.25 14:36:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2016.06.25 14:36:14 - Checking authorization ... ! 2016.06.25 14:36:14 - Connecting to Caph (Netherlands, Alblasserdam) . 2016.06.25 14:36:14 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2016.06.25 14:36:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.25 14:36:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.25 14:36:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:14 - OpenVPN > Socket Buffers: R=[163840->262144] S=[163840->262144] . 2016.06.25 14:36:14 - OpenVPN > UDPv4 link local: [undef] . 2016.06.25 14:36:14 - OpenVPN > UDPv4 link remote: [AF_INET]xxxx.xxxx.xxx:443 . 2016.06.25 14:36:14 - OpenVPN > TLS: Initial packet from [AF_INET]xxxx.xxxx.xxx.169:443, sid=44c2f999 66c0a46c . 2016.06.25 14:36:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.25 14:36:14 - OpenVPN > Validating certificate key usage . 2016.06.25 14:36:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.25 14:36:14 - OpenVPN > VERIFY KU OK . 2016.06.25 14:36:14 - OpenVPN > Validating certificate extended key usage . 2016.06.25 14:36:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.25 14:36:14 - OpenVPN > VERIFY EKU OK . 2016.06.25 14:36:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.25 14:36:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:36:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:36:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.06.25 14:36:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443 . 2016.06.25 14:36:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.25 14:36:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.210 255.255.0.0' . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.25 14:36:23 - OpenVPN > ROUTE_GATEWAY 1xxx.xxx.xx1.1/255.255.255.0 IFACE=wlan0 HWADDR=00:1b:b1:a7:7b:88 . 2016.06.25 14:36:23 - OpenVPN > TUN/TAP device tun0 opened . 2016.06.25 14:36:23 - OpenVPN > TUN/TAP TX queue length set to 100 . 2016.06.25 14:36:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.25 14:36:23 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2016.06.25 14:36:23 - OpenVPN > /sbin/ip addr add dev tun0 10.4.27.210/16 broadcast 10.4.255.255 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add xxx.xxx.xxx/32 via 192.168.1.1 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:36:28 - Starting Management Interface . 2016.06.25 14:36:28 - OpenVPN > Initialization Sequence Completed I 2016.06.25 14:36:28 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup I 2016.06.25 14:36:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) I 2016.06.25 14:36:28 - Flushing DNS I 2016.06.25 14:36:28 - Checking DNS W 2016.06.25 14:37:14 - The request timed out ! 2016.06.25 14:37:14 - Disconnecting . 2016.06.25 14:37:14 - Management - Send 'signal SIGTERM' . 2016.06.25 14:37:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.25 14:37:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.25 14:37:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del xxxx.xxxx.xxxx/32 . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2016.06.25 14:37:19 - OpenVPN > Closing TUN/TAP interface . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip addr del dev tun0 10.4.27.210/16 . 2016.06.25 14:37:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.25 14:37:19 - Connection terminated. I 2016.06.25 14:37:19 - DNS of the system restored to original settings (Rename method) )
  13. Hi, I'm a new user of AirPVN and I can't find a solution to my problem : I'm a Windows 10 user, and sometimes I might have to use an internet connection without the AirVPN, I have also the Internet Lock enable when I use AirVPN. But even after exiting properly AirVPN (disconnect to the server and then click on "Disable Internet Lock") I can't reach internet, seems like I don't successfully close the Internet Lock, any idea ? Thanks !
  14. When connected to a Server my speed drops down to 0B/s for either Upload, Download, and mostly Both. Don't know whether this is a fault via my School Campus or the VPN itself. I've been using SSH Tunnel port 53. These random speed drops produce no log entries however logs are included below Speed graph included in Screenshot below. Any Help appreciated! Thanks AirVPN_20160607_145551.txt
  15. Hello everyone, I have AirVPN installed on a second desktop of mine, and I'm having an odd problem with it. I can connect to AirVPN servers fine and get acceptable speeds, however, when I shut down the VPN, I can no longer connect to the internet. So, I need to be connected to some VPN server to be able to connect to the internet. I suspect this is due to a bug with the Network Lock feature, which I'm using on both desktops (one of which is not having any problems). Both desktops are connected to the save network via Ethernet cable. I tried disabling network lock on the afflicted desktop, but had no results. I also tried uninstalling AirVPN (and restarting the PC), which also did not help. Is this a known bug, or perhaps something entirely different? I tried searching online for a solution, but all I get are threads about people not being able to connect with a VPN, not without. Thanks in advance!
  16. Is it possible for AirVPN to purchase a server in South Korea?, i have read that their average internet speeds are even faster than Europe. Is there unsuitable laws for them to operate there? I personally do not live in China or Australia, but i do wonder if a VPN endpoint there could provide more bandwidth that is faster. http://tinyurl.com/ptc6s5y
  17. Is it possible that staff could invest in either more Latvian servers or more bandwidth? The current 100 mb/s seems to get filled up quite a bit every so often and it can become irritating. I'm not sure what the bandwidth costs are but it would be a nice addition considering there is more European bandwidth being used than American Bandwidth.
  18. I'm on a mac. ! 2016.04.01 16:01:50 - Disconnecting. 2016.04.01 16:01:50 - Connection terminated.I 2016.04.01 16:01:51 - Cancel requested.I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:01:51 - Session terminated.I 2016.04.01 16:03:02 - Session starting.I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:02 - Checking authorization ...! 2016.04.01 16:03:03 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:03 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:03 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:03 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:03 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:03 - SSH > debug1: Connection established.. 2016.04.01 16:03:03 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key type -1. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key-cert type -1. 2016.04.01 16:03:03 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:03 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:03 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:03 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:03 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:03 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:04 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:04 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:04 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:04 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:04 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:06 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:06 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:06 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key. 2016.04.01 16:03:06 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:06 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:06 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:06 - SSH > debug1: Local connections to LOCALHOST:15677 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:06 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on ::1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:06 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:06 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:06 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:06 - Disconnecting. 2016.04.01 16:03:06 - Connection terminated.I 2016.04.01 16:03:09 - Checking authorization ...! 2016.04.01 16:03:10 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:10 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:10 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:10 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:10 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:10 - SSH > debug1: Connection established.. 2016.04.01 16:03:10 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key type -1. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key-cert type -1. 2016.04.01 16:03:10 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:10 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:10 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:10 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:10 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:11 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:11 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:11 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:11 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:11 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:11 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:12 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:12 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:12 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key. 2016.04.01 16:03:12 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:12 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:12 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:12 - SSH > debug1: Local connections to LOCALHOST:56237 forwarded to remote address 127.0.0.1:2018! 2016.04.01 16:03:12 - Disconnecting. 2016.04.01 16:03:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:12 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on ::1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:12 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:12 - Connection terminated.I 2016.04.01 16:03:15 - Checking authorization ...! 2016.04.01 16:03:16 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:16 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:16 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:16 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:16 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:16 - SSH > debug1: Connection established.. 2016.04.01 16:03:16 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key type -1. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key-cert type -1. 2016.04.01 16:03:16 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:16 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:16 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:16 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:16 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:17 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:17 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:17 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:17 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:17 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:17 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:17 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:17 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:17 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key. 2016.04.01 16:03:17 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:18 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:18 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:18 - SSH > debug1: Local connections to LOCALHOST:7656 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:18 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:18 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:18 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on ::1 port 7656.! 2016.04.01 16:03:18 - Disconnecting. 2016.04.01 16:03:18 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 7656.. 2016.04.01 16:03:18 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:18 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:18 - Connection terminated.I 2016.04.01 16:03:20 - Cancel requested.I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:03:20 - Session terminated.I 2016.04.01 16:03:57 - Session starting.I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:57 - Checking authorization ...! 2016.04.01 16:03:57 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:58 - Disconnecting. 2016.04.01 16:03:58 - Connection terminated.I 2016.04.01 16:04:01 - Cancel requested.I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:04:01 - Session terminated.I 2016.04.01 16:05:43 - Session starting.I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:05:44 - Checking authorization ...! 2016.04.01 16:05:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:44 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:44 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:44 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:44 - Disconnecting. 2016.04.01 16:05:44 - Connection terminated.I 2016.04.01 16:05:47 - Checking authorization ...! 2016.04.01 16:05:47 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:47 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:47 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:48 - Disconnecting. 2016.04.01 16:05:48 - Connection terminated.I 2016.04.01 16:05:51 - Checking authorization ...! 2016.04.01 16:05:51 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:51 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:51 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:51 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:51 - Disconnecting. 2016.04.01 16:05:51 - Connection terminated.I 2016.04.01 16:05:54 - Checking authorization ...! 2016.04.01 16:05:54 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:54 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:54 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:54 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:54 - Disconnecting. 2016.04.01 16:05:54 - Connection terminated.I 2016.04.01 16:05:57 - Checking authorization ...! 2016.04.01 16:05:58 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:58 - Disconnecting. 2016.04.01 16:05:58 - Connection terminated.I 2016.04.01 16:06:01 - Checking authorization ...! 2016.04.01 16:06:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:01 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:01 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:01 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:01 - Disconnecting. 2016.04.01 16:06:01 - Connection terminated.I 2016.04.01 16:06:04 - Checking authorization ...! 2016.04.01 16:06:05 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:05 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:05 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:05 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:05 - Disconnecting. 2016.04.01 16:06:05 - Connection terminated.I 2016.04.01 16:06:08 - Checking authorization ...! 2016.04.01 16:06:08 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:08 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:08 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:08 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:08 - Disconnecting. 2016.04.01 16:06:08 - Connection terminated.I 2016.04.01 16:06:11 - Checking authorization ...! 2016.04.01 16:06:12 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:12 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:12 - Disconnecting. 2016.04.01 16:06:12 - Connection terminated.I 2016.04.01 16:06:15 - Checking authorization ...! 2016.04.01 16:06:15 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:15 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:15 - Disconnecting. 2016.04.01 16:06:15 - Connection terminated.I 2016.04.01 16:06:18 - Checking authorization ...! 2016.04.01 16:06:19 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:19 - Disconnecting. 2016.04.01 16:06:19 - Connection terminated.I 2016.04.01 16:06:22 - Checking authorization ...! 2016.04.01 16:06:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:22 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:22 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:22 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:22 - Disconnecting. 2016.04.01 16:06:22 - Connection terminated.I 2016.04.01 16:06:25 - Checking authorization ...I 2016.04.01 16:06:26 - Cancel requested.I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:26 - Session terminated.I 2016.04.01 16:06:27 - Session starting.I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:06:27 - Checking authorization ...! 2016.04.01 16:06:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:28 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:28 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:28 - Disconnecting. 2016.04.01 16:06:28 - Connection terminated.I 2016.04.01 16:06:31 - Checking authorization ...! 2016.04.01 16:06:32 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:32 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:32 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:32 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:32 - Disconnecting. 2016.04.01 16:06:32 - Connection terminated.I 2016.04.01 16:06:35 - Checking authorization ...! 2016.04.01 16:06:35 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:35 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:35 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:35 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:35 - Disconnecting. 2016.04.01 16:06:35 - Connection terminated.I 2016.04.01 16:06:38 - Checking authorization ...! 2016.04.01 16:06:38 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:38 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:38 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:38 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:38 - Disconnecting. 2016.04.01 16:06:38 - Connection terminated.I 2016.04.01 16:06:41 - Checking authorization ...! 2016.04.01 16:06:42 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:42 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:42 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:42 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:42 - Disconnecting. 2016.04.01 16:06:42 - Connection terminated.I 2016.04.01 16:06:45 - Checking authorization ...! 2016.04.01 16:06:45 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:45 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:45 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:45 - Disconnecting. 2016.04.01 16:06:45 - Connection terminated.I 2016.04.01 16:06:47 - Cancel requested.I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:48 - Session terminated.I 2016.04.01 16:07:10 - Session starting.I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:07:11 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:07:11 - Checking authorization ...! 2016.04.01 16:07:11 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:11 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:11 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:11 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:11 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:11 - SSH > debug1: Connection established.. 2016.04.01 16:07:11 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key type -1. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key-cert type -1. 2016.04.01 16:07:11 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:11 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:11 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:11 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:11 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:12 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:12 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:12 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:12 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:12 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:12 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:13 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:13 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:13 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:13 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key. 2016.04.01 16:07:13 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:13 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:13 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:13 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:13 - SSH > debug1: Local connections to LOCALHOST:24160 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on ::1 port 24160.. 2016.04.01 16:07:13 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:13 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:13 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 24160.. 2016.04.01 16:07:13 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:13 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:07:13 - Disconnecting. 2016.04.01 16:07:13 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:13 - Connection terminated.I 2016.04.01 16:07:16 - Checking authorization ...! 2016.04.01 16:07:17 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:17 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:17 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:17 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:17 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:17 - SSH > debug1: Connection established.. 2016.04.01 16:07:17 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key type -1. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key-cert type -1. 2016.04.01 16:07:17 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:17 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:18 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:18 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:18 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:18 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:18 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:18 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:18 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:18 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:19 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:19 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:19 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:19 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key. 2016.04.01 16:07:19 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:19 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:19 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:19 - SSH > debug1: Local connections to LOCALHOST:2570 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on ::1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:19 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:19 - Disconnecting. 2016.04.01 16:07:19 - Connection terminated.I 2016.04.01 16:07:22 - Checking authorization ...! 2016.04.01 16:07:23 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:23 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:23 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:23 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:23 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:23 - SSH > debug1: Connection established.. 2016.04.01 16:07:23 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key type -1. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key-cert type -1. 2016.04.01 16:07:23 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:23 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:24 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:24 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:24 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:24 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:24 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:25 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:25 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:25 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key. 2016.04.01 16:07:25 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:25 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:25 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:25 - SSH > debug1: Local connections to LOCALHOST:22654 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on ::1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:25 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:25 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:25 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:25 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:25 - Disconnecting. 2016.04.01 16:07:25 - Connection terminated.I 2016.04.01 16:07:28 - Checking authorization ...! 2016.04.01 16:07:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:28 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:28 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:28 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:28 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:28 - SSH > debug1: Connection established.. 2016.04.01 16:07:28 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key type -1. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key-cert type -1. 2016.04.01 16:07:28 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:28 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:29 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:29 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:29 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:29 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:29 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:29 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:29 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:29 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:30 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:30 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:30 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:30 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key. 2016.04.01 16:07:30 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:30 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:30 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:30 - SSH > debug1: Local connections to LOCALHOST:2708 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:30 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on ::1 port 2708.. 2016.04.01 16:07:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:30 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2708.. 2016.04.01 16:07:30 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:30 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:30 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:30 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:30 - Disconnecting. 2016.04.01 16:07:30 - Connection terminated.I 2016.04.01 16:07:34 - Checking authorization ...! 2016.04.01 16:07:34 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:34 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:34 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:34 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:34 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:34 - SSH > debug1: Connection established.. 2016.04.01 16:07:34 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key type -1. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key-cert type -1. 2016.04.01 16:07:34 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:34 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:34 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:34 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:34 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:34 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:35 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:35 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:35 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:35 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:35 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:35 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:35 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:35 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key. 2016.04.01 16:07:35 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:36 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:36 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:36 - SSH > debug1: Local connections to LOCALHOST:28938 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on ::1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:36 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:36 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:36 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:36 - Disconnecting. 2016.04.01 16:07:36 - Connection terminated.I 2016.04.01 16:07:39 - Checking authorization ...! 2016.04.01 16:07:39 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:39 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:39 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:39 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:39 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:39 - SSH > debug1: Connection established.. 2016.04.01 16:07:39 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key type -1. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key-cert type -1. 2016.04.01 16:07:39 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:39 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:39 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:39 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:39 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:40 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:40 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:40 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:40 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:40 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:40 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:41 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:41 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:41 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:41 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key. 2016.04.01 16:07:41 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:41 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:41 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:41 - SSH > debug1: Local connections to LOCALHOST:13284 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on ::1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:41 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:41 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:41 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:41 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:41 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:41 - Disconnecting. 2016.04.01 16:07:41 - Connection terminated.I 2016.04.01 16:07:44 - Checking authorization ...! 2016.04.01 16:07:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:45 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:45 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:45 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:45 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:45 - SSH > debug1: Connection established.. 2016.04.01 16:07:45 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key type -1. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key-cert type -1. 2016.04.01 16:07:45 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:45 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:45 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:45 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:45 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:46 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:46 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:46 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:46 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:46 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:46 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:46 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:46 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:46 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key. 2016.04.01 16:07:46 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:46 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:46 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:46 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:46 - SSH > debug1: Local connections to LOCALHOST:17898 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on ::1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:46 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:46 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:46 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:46 - Disconnecting. 2016.04.01 16:07:47 - Connection terminated.I 2016.04.01 16:07:50 - Checking authorization ...! 2016.04.01 16:07:50 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:50 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:50 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:50 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:50 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:50 - SSH > debug1: Connection established.. 2016.04.01 16:07:50 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key type -1. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key-cert type -1. 2016.04.01 16:07:50 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:50 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:50 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:50 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:50 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:51 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:51 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:51 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:51 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:51 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:51 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:52 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:52 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:52 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key. 2016.04.01 16:07:52 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:52 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:52 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:52 - SSH > debug1: Local connections to LOCALHOST:56837 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on ::1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:52 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:52 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:52 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:52 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:52 - Disconnecting. 2016.04.01 16:07:52 - Connection terminated.I 2016.04.01 16:07:55 - Checking authorization ...! 2016.04.01 16:07:55 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:55 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:55 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:55 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:55 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:55 - SSH > debug1: Connection established.. 2016.04.01 16:07:55 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key type -1. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key-cert type -1. 2016.04.01 16:07:55 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:55 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:56 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:56 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:56 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:56 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:56 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:56 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:56 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:56 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:57 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:57 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:57 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:57 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key. 2016.04.01 16:07:57 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:57 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:57 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:57 - SSH > debug1: Local connections to LOCALHOST:25992 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on ::1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:57 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:57 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:57 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:57 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:57 - Disconnecting. 2016.04.01 16:07:57 - Connection terminated.I 2016.04.01 16:08:00 - Checking authorization ...! 2016.04.01 16:08:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:08:01 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:08:01 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:08:01 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:08:01 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:08 - SSH > debug1: Connection established.. 2016.04.01 16:09:08 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key type -1. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key-cert type -1. 2016.04.01 16:09:08 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:08 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:08 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:08 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:08 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:09 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:09 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:09 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:09 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:09 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:09 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:09 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:09 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:09 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key. 2016.04.01 16:09:09 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:09 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:10 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:10 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:10 - SSH > debug1: Local connections to LOCALHOST:9956 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on ::1 port 9956.. 2016.04.01 16:09:10 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:10 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:10 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 9956.. 2016.04.01 16:09:10 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:10 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:09:10 - Disconnecting. 2016.04.01 16:09:10 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:10 - Connection terminated.I 2016.04.01 16:09:13 - Checking authorization ...! 2016.04.01 16:09:13 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:13 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:13 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:13 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:13 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:13 - SSH > debug1: Connection established.. 2016.04.01 16:09:13 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key type -1. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key-cert type -1. 2016.04.01 16:09:13 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:13 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:13 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:13 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:14 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:14 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:14 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:14 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:14 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:14 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:15 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:15 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:15 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:15 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key. 2016.04.01 16:09:15 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:15 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:15 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:15 - SSH > debug1: Local connections to LOCALHOST:34435 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on ::1 port 34435.. 2016.04.01 16:09:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:15 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:15 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 34435.. 2016.04.01 16:09:15 - SSH > debug1: channel 1: new [port listener]! 2016.04.01 16:09:15 - Disconnecting. 2016.04.01 16:09:15 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:15 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:15 - Connection terminated.I 2016.04.01 16:09:18 - Checking authorization ...I 2016.04.01 16:09:19 - Cancel requested.I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:09:19 - Session terminated.I 2016.04.01 16:09:21 - Session starting.I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:09:22 - Checking authorization ...! 2016.04.01 16:09:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:22 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:22 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:22 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:22 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:22 - SSH > debug1: Connection established.. 2016.04.01 16:09:22 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key type -1. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key-cert type -1. 2016.04.01 16:09:22 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:22 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:23 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:23 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:23 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:23 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:23 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:24 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:24 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:24 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key. 2016.04.01 16:09:24 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:24 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:24 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:24 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:24 - SSH > debug1: Local connections to LOCALHOST:40961 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on ::1 port 40961.. 2016.04.01 16:09:24 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:24 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:24 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 40961.. 2016.04.01 16:09:24 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:24 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:24 - SSH > debug1: Entering interactive session.! 2016.04.01 16:09:24 - Disconnecting. 2016.04.01 16:09:24 - Connection terminated.
  19. Hello, Yesterday I found out that I cannot login into my PayPal account. I'm getting this message: "Sorry, we can't log you in. If you believe there is an issue with your account, contact us." I never got any emails from PayPal saying some bad news about my account being blocked or something like that... I tried different Airvpn servers - still same problem. Last time I used PayPay was about a month ago and everything was ok. I wonder if it is VPN related? Does anyone else having this problem? Thank you.
  20. Hello, for reasons that i cannot identify my Network Lock is not working. When i disengage the VPN or the connection drops all of my applications are able to get through unfettered. I have attached my log to see if it can provide any help to you. I will also be submitting a support ticket. My Network and Sharing settings are the standard automatic for my wireless adapter and my Firewall was reset once when i could not connect without the VPN, so i am curious as to how i can fix this. Log.txt
  21. Hi! I have been using AirVPN for about 3 months now. It has worked fine, until, yesterday, I got a new router. AirVPN is now no longer able to connect with the Eddie Client for PC, but is able to connect with the OpenVPN app on my iPhone and iPad. When it says "Checking route" in the client, this is when it fails and says "Operation Failed". I have managed to identify the problem, but I have not found out how to fix it. EDIT: I have fixed the problem! I did some Google searching and I found a solution. I opened an administrator command prompt, ran netsh winsock reset catalog netsh int ipv4 reset reset.log netsh int ipv6 reset reset.login that order. I then rebooted my computer. I am now able to connect to AirVPN servers without any problems. If anyone else is having this problem, run the commands above, hopefully it fixes it for you too. My logs: I 2016.05.04 18:51:31 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.05.04 18:51:31 - Reading options from C:\Program Files\AirVPN\AirVPN.xml . 2016.05.04 18:51:32 - Data Path: C:\Program Files\AirVPN . 2016.05.04 18:51:32 - App Path: C:\Program Files\AirVPN . 2016.05.04 18:51:32 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.05.04 18:51:32 - Command line arguments (0): . 2016.05.04 18:51:32 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.05.04 18:51:32 - Updating systems & servers data ... I 2016.05.04 18:51:32 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2 I 2016.05.04 18:51:32 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.05.04 18:51:32 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.05.04 18:51:32 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.05.04 18:51:32 - Ready . 2016.05.04 18:51:33 - Systems & servers data update completed I 2016.05.04 18:52:06 - Checking login ... ! 2016.05.04 18:52:07 - Logged in. ! 2016.05.04 18:52:08 - Activation of Network Lock - Windows Firewall I 2016.05.04 18:52:34 - Session starting. I 2016.05.04 18:52:34 - IPv6 disabled. I 2016.05.04 18:52:34 - Checking authorization ... ! 2016.05.04 18:52:35 - Connecting to Atria (Sweden, Uppsala) . 2016.05.04 18:52:35 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.05.04 18:52:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.05.04 18:52:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.05.04 18:52:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.05.04 18:52:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.04 18:52:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.04 18:52:35 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.05.04 18:52:35 - OpenVPN > UDPv4 link local: [undef] . 2016.05.04 18:52:35 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443 . 2016.05.04 18:52:35 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=7a07eba3 eee7fa44 . 2016.05.04 18:52:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.05.04 18:52:35 - OpenVPN > Validating certificate key usage . 2016.05.04 18:52:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.05.04 18:52:35 - OpenVPN > VERIFY KU OK . 2016.05.04 18:52:35 - OpenVPN > Validating certificate extended key usage . 2016.05.04 18:52:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.05.04 18:52:35 - OpenVPN > VERIFY EKU OK . 2016.05.04 18:52:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.05.04 18:52:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.04 18:52:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.04 18:52:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.04 18:52:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.04 18:52:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.05.04 18:52:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443 . 2016.05.04 18:52:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.05.04 18:52:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.15 255.255.0.0' . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.05.04 18:52:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.05.04 18:52:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.05.04 18:52:39 - OpenVPN > open_tun, tt->ipv6=0 . 2016.05.04 18:52:39 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2BD6C86E-B2E4-4CF7-9738-A25DF3115706}.tap . 2016.05.04 18:52:39 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.05.04 18:52:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.15/255.255.0.0 [sUCCEEDED] . 2016.05.04 18:52:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.15/255.255.0.0 on interface {2BD6C86E-B2E4-4CF7-9738-A25DF3115706} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.05.04 18:52:39 - OpenVPN > Successful ARP Flush on interface [22] {2BD6C86E-B2E4-4CF7-9738-A25DF3115706} . 2016.05.04 18:52:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.05.04 18:52:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 10.10.10.1 . 2016.05.04 18:52:44 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.05.04 18:52:44 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.05.04 18:52:44 - OpenVPN > Route addition fallback to route.exe . 2016.05.04 18:52:44 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.05.04 18:52:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.04 18:52:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.05.04 18:52:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.04 18:52:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.04 18:52:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.05.04 18:52:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.04 18:52:44 - Starting Management Interface . 2016.05.04 18:52:44 - OpenVPN > Initialization Sequence Completed I 2016.05.04 18:52:45 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.05.04 18:53:03 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.05.04 18:53:03 - Flushing DNS I 2016.05.04 18:53:04 - Checking route W 2016.05.04 18:54:16 - The operation has timed out ! 2016.05.04 18:54:16 - Disconnecting . 2016.05.04 18:54:16 - Management - Send 'signal SIGTERM' . 2016.05.04 18:54:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.05.04 18:54:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.05.04 18:54:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.05.04 18:54:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 10.10.10.1 . 2016.05.04 18:54:21 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.05.04 18:54:21 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.05.04 18:54:21 - OpenVPN > Route deletion fallback to route.exe . 2016.05.04 18:54:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.05.04 18:54:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.04 18:54:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.04 18:54:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.04 18:54:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.04 18:54:21 - OpenVPN > Closing TUN/TAP interface . 2016.05.04 18:54:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.05.04 18:54:21 - Connection terminated. I 2016.05.04 18:54:21 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.05.04 18:54:41 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller) I 2016.05.04 18:54:42 - Cancel requested. I 2016.05.04 18:54:42 - IPv6 restored. ! 2016.05.04 18:54:42 - Session terminated. ! 2016.05.04 18:55:50 - Deactivation of Network Lock The Default Gateway of my OLD router was 10.10.10.1. However, the default gateway of the new router is different (10.10.1.1) It looks like the AirVPN client is still trying to connect to the old default gateway IP, not the new one. That seems to be the issue. How do I fix it so that the client uses my new default gateway IP, instead of the old one? (I am on Windows 10 by the way)
  22. Hello, as many of you know some users of AirVPN that actually value geolocation accuracy on web based services such as google such as my self have noted MANY times that services such as Google do not detect the proper country of the VPN servers we use. I would like to request that a chart of each and every server be made that lists the accuracy of geolocation on both Google.com and Ipleak.net. I consistently find myself searching server after server for one that is both fast and accurate. I would like it noted that most AirVPN users could care less about this and support even less so; all i ask is that it be made easier for the minority to access accurate servers without trial and error.
  23. Hello, it seems there might be a DNS issue on the new Atria server. Can someone verify this?
  24. Hello, can someone help me to set up AirVPN on a QNAP-NAS with firmware 4.2.1 please. Or just point me to a post which explains that. Thanks you so much! Jörg
  25. Hi, On the experimental client (2.10.3) mono required, the binary stunnel is build with openssl .1.0.1f, which, have if i'm not making a mistake, multiples vulnerability Any reason why the stunnel binary is outdated ? Thanks !
×
×
  • Create New...