Jump to content
Not connected, Your IP: 3.137.185.180

Search the Community

Showing results for tags 'AirVPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 194 results

  1. Hello, I have a question that maybe someone more knowledgeable can answer. I have a computer at home that runs airvpn client and a remote computer. I want to be able to connect from either computer to another one with ssh. Without airvpn client, everything works (obviously). If I run airvpn without network lock, I can ssh from home to remote (it goes via the AirVPN server) but not from remote to home. I tried to start airvpn with the parameter "routes.custom=my.remote.ip.addr,255.255.255.255,out" but it didn't help - the required route was not added to the routing table. However, that problem was easily solved: I added the route separately with "route add -host my.remote.ip.address gw 192.168.1.1" and all was well: ssh works from home to remote and from remote to home bypassing AirVPN as I want it to do. Now, I enable network lock. This time I need to add "allowed IP" parameter to be able to ssh from home to remote: ./airvpn -cli -connect -netlock -login=**** password=**** netlock.allowed_ips=my.remote.ip.addr But ssh from remote to home is blocked by the firewall. I can't find any airvpn parameter that can be used to create custom firewall rules. So I ended up with adding the required rule myself. Before: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 177 16717 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 93 8963 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 26 4651 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1890 460K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 6 502 DROP all -- any any anywhere anywhere Add the rule: iptables -t filter -I INPUT 9 -i eth0 -p tcp -s my.remote.ip.addr --dport 22 -j ACCEPT After: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 182 17197 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 107 10296 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 41 6945 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1981 480K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 0 0 ACCEPT tcp -- eth0 any my.remote.ip.addr anywhere tcp dpt:22 10 6 502 DROP all -- any any anywhere anywhere Now everything works again, but the question remains: what is the best way to achieve that ? In the worst case scenario, I can just start airvpn in the background, wait a minute or so and then run iptables with my additional rule. But that looks ugly. Can anyone think of a better way ? Maybe some "event.session..." or "event.vpn..." parameter will do the trick ? Thanks for any help.
  2. hello there when deactivate network lock and exit from Eddie on windows 7 I don't have internet any help Thank you
  3. hello all I have some trouble with airvpn on pfsense 2.3 I setup on esxi 6 pfsense and followed the instruction to route all my hosts trough airvpn the problem now is that all my hosts don't have an internet example windows server 2012 R2 shows that I have internet, but I can't open a single page I used almighty PING to troubleshooting the problem and I can ping the pfsense, but I can't ping the cable modem(I am not sure that I suppose to ping the cable modem) I follow the the steps once again and I found something in "Step 4-b: Setting the AirVpn Gateway" Gateways After Editing AirVPN_WAN System: Gateways | Gateways | ______________________________________________________________________________________________________________________________________________ | Name | Interface | Gateway | Monitor IP | Description | Actions | | | | | | | | |_____________________|________________|___________________________|___________________________|________________________________|____________| | WAN_DHCP | WAN | 192.168.1.1 | 192.168.1.1 | Interface WAN_DHCP Gateway | | | (default) | | | | | ✐ ☐ Ø π | |_____________________|________________|___________________________|___________________________|________________________________|____________| | AirVPN_WAN | AirVPN_WAN | | | AirVPN_WAN | | | | | | | | ✐ ☐ Ø π | |_____________________|________________|___________________________|___________________________|________________________________|____________| in main WAN_DHCP (default) is under the AirVPN_WAN Is that going to make a difference ?????? Thank you
  4. EDIT: I realize that without developer mode enabled I can not connect to Air via ChromeOS.
  5. Hi I have never been able to connect with the AirVPN client on OSX Sierra. It connects through the Windows client, Tunnelblick and OpenVPN but I would like to use the AirVPN client for more control. Can someone please suggest something. Here's my log:
  6. Hello there ​ ​I have setup in pfsense airvpn DNS Resolver and I am trying to setup internal DNS server with Ubuntu server. In order to do so I need a DNS Forwarder. How can I use airvpn DNS ? so I won't have any dns leaks from my internal network ​Thank you ​ ​
  7. Hello, now i get my new connection and with it i get ipv6 only. There is a ds-lite tunnel for ipv4 things but it won't work with the AirVPN client. I always get the following: The machine runs with Xubuntu 16.10 64bit. You will find my logfile in the Attachment. I can't use AirVPN now. :-( What can i do? Cheers AirVPN_20161202_090120.txt
  8. If you're running AirVPN on Linux you probably don't want to have to type your sudo password in each time it runs. Why? If you're auto-starting it, you want your network lock and VPN connection to happen as soon as you login. Here's what I did for Ubuntu (Actually Kubuntu)... Install gksu (sudo apt install gksu) Add AirVPN to your autostart list and for command use gksudo /usr/bin/airvpn Run sudo nano /usr/share/applications/AirVPN.desktop and change the command to gksudo /usr/bin/airvpn Edit the AirVPN entry in your application launcher and change the command to gksudo /usr/bin/airvpn Run sudo visudo and add the line %airvpn ALL=(ALL:ALL) NOPASSWD: /usr/bin/airvpn after all other rules (Press Ctrl+x and then Enter to exit and save). Run sudo groupadd airvpn Run sudo usermod -a -G airvpn user replacing "user" with your account's username. You're done. The next time you login (Or start it any any other way) AirVPN will start without entering any password. Note: Your AirVPN settings will be back to default after doing this. Don't worry, just set them again and they'll save.
  9. Is anyone able to get good speeds on Alcor? The most i was able to get was 4-5 mbits/second. Other servers nearby in Latvia and Lithuania can get 20-40 mbits per second.
  10. Just curious why Netherlands is the most used country aside from having the most servers. I always thought Sweden and Switzerland had better laws regarding privacy and filesharing. Could someone inform me of Netherlands benefits over other locations in Europe aside from having central peering? I mean, is there a non technical reason for it or is the peering the only thing that makes it preferable to other countries in Europe?
  11. Dears, I've followed the tutorial on how to connect to AirVPN through DD-WRT but it seems that I can't do it on my own So I would appreciate your help The error I'm getting is: Clientlog: 20161112 18:22:31 N TLS Error: TLS handshake failed 20161112 18:22:31 I SIGUSR1[soft tls-error] received process restarting 20161112 18:22:31 Restart pause 2 second(s) 20161112 18:22:33 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:22:33 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:22:33 I UDPv4 link local: [undef] 20161112 18:22:33 I UDPv4 link remote: [AF_INET]109.232.227.148:443 20161112 18:23:33 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:23:33 N TLS Error: TLS handshake failed 20161112 18:23:33 I SIGUSR1[soft tls-error] received process restarting 20161112 18:23:33 Restart pause 2 second(s) 20161112 18:23:35 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:23:35 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:23:35 I UDPv4 link local: [undef] 20161112 18:23:35 I UDPv4 link remote: [AF_INET]109.232.227.148:443 20161112 18:24:35 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:24:35 N TLS Error: TLS handshake failed 20161112 18:24:35 I SIGUSR1[soft tls-error] received process restarting 20161112 18:24:35 Restart pause 2 second(s) 20161112 18:24:37 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:24:37 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:24:39 I UDPv4 link local: [undef] 20161112 18:24:39 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'status 2' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'log 500' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:39 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:25:39 N TLS Error: TLS handshake failed 20161112 18:25:39 I SIGUSR1[soft tls-error] received process restarting 20161112 18:25:39 Restart pause 2 second(s) 20161112 18:25:41 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:25:41 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:25:41 I UDPv4 link local: [undef] 20161112 18:25:41 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:26:41 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:26:41 N TLS Error: TLS handshake failed 20161112 18:26:41 I SIGUSR1[soft tls-error] received process restarting 20161112 18:26:41 Restart pause 2 second(s) 20161112 18:26:43 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:26:43 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:26:43 I UDPv4 link local: [undef] 20161112 18:26:43 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:27:43 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:27:43 N TLS Error: TLS handshake failed 20161112 18:27:43 I SIGUSR1[soft tls-error] received process restarting 20161112 18:27:43 Restart pause 2 second(s) 20161112 18:27:45 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:27:45 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:27:45 I UDPv4 link local: [undef] 20161112 18:27:45 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:28:46 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:28:46 N TLS Error: TLS handshake failed 20161112 18:28:46 I SIGUSR1[soft tls-error] received process restarting 20161112 18:28:46 Restart pause 2 second(s) 20161112 18:28:48 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:28:48 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:28:48 I UDPv4 link local: [undef] 20161112 18:28:48 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:29:48 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:29:48 N TLS Error: TLS handshake failed 20161112 18:29:48 I SIGUSR1[soft tls-error] received process restarting 20161112 18:29:48 Restart pause 2 second(s) 20161112 18:29:50 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:29:50 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:29:52 I UDPv4 link local: [undef] 20161112 18:29:52 I UDPv4 link remote: [AF_INET]213.152.161.132:443 20161112 18:30:52 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:30:52 N TLS Error: TLS handshake failed 20161112 18:30:52 I SIGUSR1[soft tls-error] received process restarting 20161112 18:30:52 Restart pause 2 second(s) 20161112 18:30:54 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:30:54 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:30:54 I UDPv4 link local: [undef] 20161112 18:30:54 I UDPv4 link remote: [AF_INET]213.152.161.132:443 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'status 2' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'log 500' 19700101 01:00:00 ca /tmp/openvpncl/ca.crt cert /tmp/openvpncl/client.crt key /tmp/openvpncl/client.key management 127.0.0.1 16 management-log-cache 100 verb 3 mute 3 syslog writepid /var/run/openvpncl.pid client resolv-retry infinite nobind persist-key persist-tun script-security 2 dev tun1 proto udp cipher aes-256-cbc auth sha1 remote nl.vpn.airdns.org 443 comp-lzo yes tls-client tun-mtu 1500 mtu-disc yes ns-cert-type server fast-io tun-ipv6 tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 Can someone please help me ? I've attached my config in DD-WRT Thanks.
  12. I've recently purchased AirVPN and set up the client for usage with two windows devices, however I'm having issues with one of my Linux systems. In the first instance, when trying to install the client via the package installer, I received the message: Error: Dependency is not satisfiable: "libmono-system-runtime2.0-cil" ... Since I couldn't use the installer, I downloaded the mobile client instead. Everything seemed to be running smoothly, except when I ran a check on ipleak.net, I found that my UK details were displayed along with the foreign IP from the VPN. My accurate location was also shown on the Google Maps image at the bottom of the screen. This is not the case with either of my windows devices. In the windows instances, the only addresses and locations shown are those coming from the VPN. Also, the ipleaks check reads: "AirVPN Exit Node: No." With both my windows devices, this section reads: "AirVPN Exit Node: Yes." Forgive me if I sound foolish, but I really am confused as to what the issue could be. Any help would be greatly appreciated.
  13. Two different topics in the same post since I can only make a single post a day. Sorry. First, what is the proper way to set the.ovpn configuration file in order to enable VPN through Tor? I have attempted using 127.0.0.1 as the SOCKS proxy but that has not worked. Maybe it has something to do with the control port? Second, I have been able to get Eddie started on CentOS 7, but for some reason, Eddie does not connect to any server. I used all default settings once, and then disabled DNS check. Posting relevant log below: I 2016.09.30 12:22:37 - Session starting. I 2016.09.30 12:22:38 - Checking authorization ... ! 2016.09.30 12:22:38 - Connecting to Gemma (Canada, Vancouver) . 2016.09.30 12:22:38 - OpenVPN > OpenVPN 2.3.12 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Aug 23 2016 . 2016.09.30 12:22:38 - OpenVPN > library versions: OpenSSL 1.0.1e-fips 11 Feb 2013, LZO 2.06 . 2016.09.30 12:22:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 12:22:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 12:22:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link remote: [AF_INET]##.##.###.###:443 . 2016.09.30 12:23:10 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2016.09.30 12:23:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 12:23:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2016.09.30 12:23:15 - Disconnecting . 2016.09.30 12:23:15 - Connection terminated. I 2016.09.30 12:23:16 - Cancel requested. ! 2016.09.30 12:23:16 - Session terminated. If any advancements have been made in either issues, I would greatly appreciate any news - even if it's bad news.
  14. Hello everyone I have a problem with Deluge when used with AirVPN, under Eddie client, v.2.10.3. If i don't activate AirVPN, Deluge is downloading at about 4MiB/s for a random debian image. If i do the same with AirVPN activated, my download speed becomes really slow, never above 40Kib/s. I've tried a lot of things. Changing server, configuring Eddie to use some other ports like SSL, SSH and other alternative ports, tried some parameters in Deluge too... And no changes... I double checked too that the port set in Deluge parameters is forwarded in my client interface on AirVPN website and still no changes. I noticed that my port forwarding in AirVPN website now indicates some bad result when I press the "check" button (not reachable, error 111). Why is it so now ? Other thing I noticed, when Deluge is started, i can barely surf the web, it's veeeeeeery slow. Seems like I have not only one problem, but at least two... Any suggestions ? Here's my config for Deluge : And my port forwarding in AirVPN website interface : Thanks in advance
  15. Hi guys, I've subscribed to the Airvpn service about 4 months ago and I'm very happy with it. Nevertheless, as a Linux user (currently Lubuntu 16.04) which isn't using the client option, it was becoming somewhat annoying to turn on and turn off the openvpn and the stunnel in different terminals every time. Few days ago I sat and wrote a small CLI script in python, that is automating the process of connecting and disconnecting to the Airvpn service. The script can be found here: https://github.com/hemulin/airvpn_toggler Simply put, what it does is: When turning on - 1) Scanning the configs files folder and asking you from which country you wish to exit 2) After you choose a country, it turns on the stunnel as a background process and waiting for it to finish the initialization 3) After the stunnel init has finished, it turns on the openvpn as a background process and waiting for it to finish init. 4) After the openvpn has finished its init, the script validates that the external IP has changed and if yes, adding a system tray indicator to show it is connected. When turning off - 1) Killing the system tray indicator, the openvpn and the stunnel processes. 2) Validating that the external IP has changed. Currently it is working well for me, but I still consider it to be a "work in progress", so (1) I still improves it and (2) Feel free to ask for features (and of course, forks and pull requests are welcome). Cheers, Hemulin
  16. Hello! I found an issue... When using the Testpage of AirVPN for DNS- and WebRTC-Leaks (www.ipleak.net) it's actually not showing WebRTC-Leaks, although they are there! Under circumstances this can cause serious trouble for the VPN-Users, because when they don't see any leaks, most of them will be sure that there are no leaks - but that can be very false! I discovered clear WebRTC-Leaks on a Windows7-machine + up-to-date Firefox; but ipleak.net only showed me the internal IP leaks! (which are actually not dangerous) I opened 2 Firefox-Windows while connected to a AirVPN-Server and while ipleak.net didn't show real-IP leaks, at the same moment another site clearly showed these WebRTC-leaks (GitHub)! As you can see on the screenshot ipleak.net doesn't show anything suspicious, but Github shows all the leaks including my real Provider-IP + all internal Network IP's; so actually EVERYTHING was leaking and totally broke the anonymity of AirVPN in my Browser! Now I want to know why ipleak.net provides WebRTC-leak-detecion, when it actually not working at all (also tested on Linux!) Try it yourself and you will see what I mean: 1. https://ipleak.net/ 2. https://diafygi.github.io/webrtc-ips/ Please also check my screenshot below! Btw. you can fix that leak easily in your Firefox-Settings! Answers are welcome! regards, me
  17. Hello all, This is collection from different tutorials which I will refer here, but usually changed since some things changed. Setting up VPN on Synology is modified neolefort tutorial from here and reconnect script if from sundi which you can find here, which probably modified this script, plus my iptables for blocking Synology on router level when VPN fails. Other contributions: foobar666 - you no longer need to enter variables manually _sinnerman_ - fixed script for DS 6.1 I'm doing this mostly because I usually forget things I managed to solve after year or two, so this is way to have constant reminder how it was solved and also help others. 1. Get your certificates from AirVPN. Go to the https://airvpn.org/generator/ page to generate the configuration file. (1) SELECT the Advanced Mode (under "Config generator" title ) (2) SELECT LINUX OS (3) Under "Protocols" section select one with protocol UDP, port 443 and tls-auth in the right column (at the time of writing, it was in middle of the list). You can choose any combination of protocol/port, but then also change iptables accordingly if you are using failsafe script. Don't choose any combination which has tls-crypt in the right column. (4) Under "Advanced - OpenVPN only" section (right part of page), toggle "Separate keys/certs from .ovpn file" button and change/leave OpenVPN version to 2.5 (This works in DSM 7.2.1. For older versions you will maybe have to select OpenVPN version 2.4). (5) SELECT 1 SERVER (refer to section "by single servers") OR COUNTRY OR ANYTHING ELSE YOU WANT In original tutorial, neolefort said to choose 1 server, because in that case you will get IP instead of xxx.airvpn.org domain. Choosing 1 server is safe because it doesn't need working DNS when you want to connect to VPN. If you choose anything else, you need working DNS on your router when establishing VPN connection. (6) Click "GENERATE" at the bottom. (7) Page will reload with links on top to your files, save them to you computer. Following files will be generated: -AirVPN_XXXXX_UDP-443.ovpn -ca.crt -user.crt -user.key -ta.key 2. Setup AirVPN on Synology. - Login as admin or with user from Administrator group. - Open Control panel. - Go "Network" and click on tab "Network Interface" - Click on button "Create" - "Create VPN profile" - Choose "OpenVPN (via importing .ovpn file)" - Click "Advanced options" so it shows all options - Profile name: anything you want, but please keep is short and if you can without spaces " ", for example "AirVPN". - User name: LEAVE EMPTY (for DSM 7+ just put anything here) - Password: LEAVE EMPTY (for DSM 7+ just put anything here) - Import .ovpn file: click button and import your AirVPN_XXXXX_UDP-443.ovpn - CA certificate: click button and import your ca.crt - Client certificate: click button and import your user.crt - Client key: click button and import your user.key - Certificate revocation: LEAVE EMPTY - TLS-auth key: click button and import your ta.key - Click "Next" - Select all options and click "Done" Now you have working OpenVPN link on your Synology. You just need to start it from "Control panel" - "Network" - "Network Interface". If you want to make your connection faster, you can remove some ciphers. Look for this line in .ovpn file: data-ciphers AES-256-GCM:AES-256-CBC:AES-192-GCM:AES-192-CBC:AES-128-GCM:AES-128-CBC And change it to this: data-ciphers AES-128-GCM Then save file and create new connection with it. After some testing I found out AES-128-GCM is fastest from all other mentioned in settings. You can also test other ciphers your self and leave one you find fastest. EXTRAS!!! 3. Setting up external access to your Synology. First what you will notice is, "I CAN'T ACCESS MY SYNOLOGY FROM OUTSIDE OF MY LAN!!!!!!! OMG OMG OMG!!!!" I will not explain port fowards on your router here, if you don't know how to make one, learn! (1) You can port forward trough AirVPN webpage and access your Syno via VPN exit IP. This sometimes works, most of times it doesn't since Syno has some ports you cannot change. Anyway, change your default HTTP / HTTPS port on Syno to your forwarded AirVPN port and you should be fine. But forget about Cloudstation and similliar things. (2) If you want to access Syno via you ISP IP (WAN), then problem is, your Syno is receiving your connection, but it's replying trough VPN. That's a security risk and those connections get droped. But there is solution! - Access "Control panel" - "Network" - "General" - Click "Advanced Settings" button - Mark "Enable multiple gateways" and click "OK" and then "Apply" You're done! It's working now (if you forwarded good ports on your router). 4. Prevent leaks when VPN connection on Synology fails. There will be time, when you VPN will fail, drop, disconnect, and your ISP IP will become visible to world. This is one of ways you can prevent it, on router level. For this you need Tomato, Merlin, DD-WRT or OpenWRT firmware on your router. I will tell you steps for Tomato router. If you are using different firmware, then you need to learn alone how to input this code into your router. Since Shibby version 129 for ARM routers, syntax of iptables changed and depending on which version of iptables you are using, apply that code. - Login to your router (usually just by entering 192.168.1.1 into your browser, if your IP is different, find out which is your gateway IP). - Click on "Administration" - Click on "Scripts" - Choose tab "Firewall" For Shibby v129 for ARM and later (iptables 1.4.x) us this: #Use this order of commands because it executes in reverse order. #This command will execute last, it kills all UDP requests. iptables -I FORWARD -p udp -s 192.168.1.100 -j REJECT #This command will execute second and will block all TCP source ports except those needed for web access or services iptables -I FORWARD -p tcp -s 192.168.1.100 -m multiport ! --sports 5000,5001,6690 -j REJECT #This command will execute first and will ACCEPT connection to your VPN on destination port 443 UDP iptables -I FORWARD -p udp -s 192.168.1.100 -m multiport --dports 443 -j ACCEPT For earlier Shibby versions and later for MIPS routers: #Use this order of commands because it executes in reverse order. #This command will execute last, it kills all UDP requests. iptables -I FORWARD -p udp -s 192.168.1.100 -j REJECT #This command will execute second and will block all TCP source ports except those needed for web access or services iptables -I FORWARD -p tcp -s 192.168.1.100 -m multiport --sports ! 5000,5001,6690 -j REJECT #This command will execute first and will ACCEPT connection to your VPN on destination port 443 UDP iptables -I FORWARD -p udp -s 192.168.1.100 -m multiport --dports 443 -j ACCEPT Port TCP 5000 = HTTP for for Synology web access (change to your if it's not default) Port TCP 5001 = HTTPS for for Synology web access (change to your it's not default) Port TCP 6690 = Cloud Station port Port UDP 443 = AirVPN connection port which you defined in step 1 of this tutorial. If you are using TCP port, then you need to change "-p udp" to "-p tcp" in that line. If you need more ports, just add them separated by comma ",". If you want port range, for example 123,124,125,126,127, you can add it like this 123:127. Change IP 192.168.1.100 to your Synology LAN IP. Be careful NOT TO assign those ports to your Download Station on Synology. This isn't perfect, you can still leak your IP through UDP 443, but since torrent uses mostly TCP, those chances are minimal. If you use TCP port for VPN, then those chances increase. If you really want to be sure nothing leaks even on UDP 443 (or your custom port), you need to choose 1 (ONE) AirVPN server. You need to find that server entry IP and change last IPTABLES rule to something like this: iptables -I FORWARD -p udp -s 192.168.1.100 -d 123.456.789.123 -m multiport --dports 443 -j ACCEPT Where 123.456.789.123 is AirVPN server entry IP. This will allow UDP 443 only for that server, rest will be rejected by router. These are all my opinions, from my very limited knowledge, which may be right and may be wrong. 5. Auto reconnection when VPN is down. Since when you made your VPN connection on your Synology, you checked "Reconnect" option, Syno will try to reconnect automaticly when connection fails. But in some cases, your network will be offline long enough and Syno will stop trying to reconnect, or will hang with VPN connection established, but not working. In those cases you can use this auto reconnect script. This is reconnect script. Just select all script text and copy it. #VPN Check script modified Sep 11, 2016 #Script checks if VPN is up, and if it is, it checks if it's working or not. It provides details like VPN is up since, data #received/sent, VPN IP & WAN IP. #If VPN is not up it will report it in the log file and start it #Change LogFile path to your own location. #Save this script to file of your choosing (for example "synovpn_reconnect"). Store it in one of your Synology shared folders and chmod it: "chmod +x /volume1/shared_folder_name/your_path/synovpn_reconnect" #Edit "/etc/crontab" and add this line without quotes for starting script every 10 minutes: "*/10 * * * * root /volume1/shared_folder_name/your_path/synovpn_reconnect" #After that restart cron with: "/usr/syno/sbin/synoservicectl --restart crond" #!/bin/sh DATE=$(date +"%F") TIME=$(date +"%T") VPNID=$(grep "\[.*\]" /usr/syno/etc/synovpnclient/openvpn/ovpnclient.conf | cut -f 2 -d "[" | cut -f 1 -d "]") VPNNAME=$(grep conf_name /usr/syno/etc/synovpnclient/openvpn/ovpnclient.conf | cut -f 2 -d "=") LogFile="/volume1/filmovi/Backup/airvpn/check_airvpn_$DATE.log" PUBIP=$(curl -s -m 5 icanhazip.com) #PUBIP=$(curl -s -m 5 ipinfo.io/ip) #PUBIP=$(curl -s -m 5 ifconfig.me) CHECKIP=$(echo $PUBIP | grep -c ".") start_vpn() { echo "VPN is down. Attempting to (re)start now." >> $LogFile # /usr/syno/bin/synovpnc kill_client --protocol=openvpn --name=$VPNNAME /usr/syno/bin/synovpnc kill_client /bin/kill `cat /var/run/ovpn_client.pid` 2>/dev/null sleep 35 echo 1 > /usr/syno/etc/synovpnclient/vpnc_connecting echo conf_id=$VPNID > /usr/syno/etc/synovpnclient/vpnc_connecting echo conf_name=$VPNNAME >> /usr/syno/etc/synovpnclient/vpnc_connecting echo proto=openvpn >> /usr/syno/etc/synovpnclient/vpnc_connecting /usr/syno/bin/synovpnc reconnect --protocol=openvpn --name=$VPNNAME >> $LogFile } sleep 6 echo "======================================" >> $LogFile echo "$DATE $TIME" >> $LogFile if ifconfig tun0 | grep -q "00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00" then if [ "$CHECKIP" == 1 ] then IPADDR=$(/sbin/ifconfig tun0 | grep 'inet addr' | cut -d: -f2 | awk '{print $1}') RXDATA=$(/sbin/ifconfig tun0 | grep "bytes:" | cut -d: -f2 | awk '{print $1,$2,$3}') TXDATA=$(/sbin/ifconfig tun0 | grep "bytes:" | cut -d: -f3 | awk '{print $1,$2,$3}') UPTIME=$(cat /var/log/messages | grep "$IPADDR" | awk '{print $1}' | tail -1) UPTIME=$(date -d"$UPTIME" +"%Y/%m/%d %H:%M:%S") echo "VPN is up since: $UPTIME" >> $LogFile echo "Session Data RX: $RXDATA" >> $LogFile echo "Session Data TX: $TXDATA" >> $LogFile echo "VPN IP is: $IPADDR" >> $LogFile echo "WAN IP is: $PUBIP" >> $LogFile else start_vpn fi else start_vpn fi exit 0 (1) Login to you Synology DSM web interface as admin. - As admin go to "Control panel" - "Task Scheduler" (you need to enable advanced mode in top right corner of control panel for this) - Click "Create" button near top of page, then select "Scheduled Task" and then "User-defined script" (2) New popup window will open. - under "Task:" enter task name - under "User:" select "root" if it's not already selected - switch to "Schedule" tab and select how often you want this task to run, my settings are: - "Run of following days" - "Daily" - "First run time" - 00:00 - "Frequency" - "Every 10 minutes" - "Last run time" - 23:50 - switch to "Task settings" tab - paste script you copied into empty box under "User-defined script" title - press OK and you're done I tested this on DSM 6.2.2 and it works without problems for now. Still, I'm keeping old instructions in next post, if someone wants to do it like that. Tip: If you don't want logfile, you can comment out those lines, or remove ">> $LogFile" code from whole script. That's all. If you entered everything correctly, you should be fine and ready to go! Comments are welcome. If you find mistakes, please correct me.
  18. I understand this is vpn site it would be nice to view the forums and customer pages from an onion address. for the privacy minded folks out there who use tor and vpn together and would like to avoid bad tor exit nodes it would not be to hard for air admins to set this up. installing tor on server is very easy thanks!
  19. Hi, the port forwarding feature caught my attention but I have some doubts. I think I'm completely lost with this. Let's say I have a server running Linux, basically serving a webpage, I have port forwarding enabled on my router so anyone with my external IP address can connect to it. Okay now let's say I don't want to give out my real IP address, if I understand how the VPN port forwarding feature works, I could use a VPN server to serve that webpage and hide my real IP address (I'd have to deactivate port forwarding on my router and configure it with AirVPN) Is that right? So I connect that Linux server through OpenVPN to an AirVPN's server with port forwarding enabled. For a VPN server, which is a single IP address, there could be maybe 50 persons connected to it, we're sharing the server somehow, but those persons could also enable port forwarding, so, what are the limits/ranges? Two different persons on the same server can't port forward a same port? How does it work? Thanks
  20. I'm experiencing very slow speeds using AirVPN. I've been using another VPN service for a year now but their service is becoming crap, can't get a stable connection, so I'm looking for an alternative. Today I purchased a Trial of AirVPN to see what the service with them would be like. My ISP provides me 100Mbps download 10Mbps upload, but when connected through AirVPN servers, I get around 3Mbps download speeds, I can't understand why the connections are so bad and why the speeds are so slow and unstable, even when selecting servers located in the same country. Is this normal? Alternatives?
  21. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  22. Hello, recently since like 1 or 1.5 week my airvpn is having strange behaviour. It now and then suddenly disconnects, and then needs to reconnect / authorize again. Somehow it doesnt feel natural / a pc conflict this problem but i could be wrong. Maybe its important, but these logs no one changed anything like settings not on the network and not on my laptop. The first 2 disconnects i was sleeping, so no user activity on the laptop as well. last disconnect i was browsing. . 2016.07.15 23:11:45 - Systems & servers data update completed . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:23:44 - OpenVPN > Validating certificate key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:23:44 - OpenVPN > VERIFY KU OK . 2016.07.15 23:23:44 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:23:44 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:00 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060) . 2016.07.15 23:40:00 - OpenVPN > Connection reset, restarting [-1] . 2016.07.15 23:40:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.15 23:40:00 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.15 23:40:00 - Disconnecting . 2016.07.15 23:40:00 - Management - Send 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.15 23:40:00 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.15 23:40:00 - OpenVPN > Exiting due to fatal error . 2016.07.15 23:40:01 - Connection terminated. I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:21 - Checking authorization ... ! 2016.07.15 23:40:21 - Connecting to Azmidiske (Sweden, Uppsala) . 2016.07.15 23:40:21 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.15 23:40:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.15 23:40:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.15 23:40:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.15 23:40:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.15 23:40:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.141:443 [nonblock] . 2016.07.15 23:40:23 - OpenVPN > TCP connection established with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.141:443, sid=f51e2740 2526a036 . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:40:23 - OpenVPN > Validating certificate key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:40:23 - OpenVPN > VERIFY KU OK . 2016.07.15 23:40:23 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:40:23 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.15 23:40:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.224 255.255.0.0' . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.15 23:40:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.15 23:40:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.15 23:40:28 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.15 23:40:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.15 23:40:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.224/255.255.0.0 [sUCCEEDED] . 2016.07.15 23:40:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.224/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.15 23:40:28 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.15 23:40:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.141 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:34 - Starting Management Interface . 2016.07.15 23:40:34 - OpenVPN > Initialization Sequence Completed I 2016.07.15 23:40:34 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:34 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:34 - Flushing DNS I 2016.07.15 23:40:35 - Checking DNS ! 2016.07.15 23:40:36 - Connected. . 2016.07.15 23:40:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.15 23:40:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.15 23:42:20 - Updating systems & servers data ... . 2016.07.15 23:42:21 - Systems & servers data update completed . 2016.07.16 00:12:56 - Updating systems & servers data ... . 2016.07.16 00:12:57 - Systems & servers data update completed . 2016.07.16 00:40:25 - OpenVPN > TLS: soft reset sec=0 bytes=1306479/0 pkts=4397/0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 00:40:26 - OpenVPN > Validating certificate key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY KU OK . 2016.07.16 00:40:26 - OpenVPN > Validating certificate extended key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 00:40:26 - OpenVPN > VERIFY EKU OK . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 00:43:32 - Updating systems & servers data ... . 2016.07.16 00:43:33 - Systems & servers data update completed . 2016.07.16 01:13:50 - Updating systems & servers data ... . 2016.07.16 01:13:52 - Systems & servers data update completed I 2016.07.16 01:40:25 - Renewing TLS key . 2016.07.16 01:40:25 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 01:40:27 - OpenVPN > TLS: soft reset sec=0 bytes=14841430/0 pkts=38149/0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 01:40:27 - OpenVPN > Validating certificate key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY KU OK . 2016.07.16 01:40:27 - OpenVPN > Validating certificate extended key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 01:40:27 - OpenVPN > VERIFY EKU OK . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 01:44:32 - Updating systems & servers data ... . 2016.07.16 01:44:34 - Systems & servers data update completed . 2016.07.16 02:14:41 - Updating systems & servers data ... . 2016.07.16 02:14:42 - Systems & servers data update completed I 2016.07.16 02:40:27 - Renewing TLS key . 2016.07.16 02:40:27 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 02:40:28 - OpenVPN > TLS: soft reset sec=0 bytes=24638897/0 pkts=53803/0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 02:40:28 - OpenVPN > Validating certificate key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY KU OK . 2016.07.16 02:40:28 - OpenVPN > Validating certificate extended key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 02:40:28 - OpenVPN > VERIFY EKU OK . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 02:44:44 - Updating systems & servers data ... . 2016.07.16 02:44:46 - Systems & servers data update completed . 2016.07.16 03:15:37 - Updating systems & servers data ... . 2016.07.16 03:15:39 - Systems & servers data update completed I 2016.07.16 03:40:28 - Renewing TLS key . 2016.07.16 03:40:28 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 03:40:29 - OpenVPN > TLS: soft reset sec=0 bytes=11152806/0 pkts=38076/0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 03:40:29 - OpenVPN > Validating certificate key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY KU OK . 2016.07.16 03:40:29 - OpenVPN > Validating certificate extended key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 03:40:29 - OpenVPN > VERIFY EKU OK . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 03:46:14 - Updating systems & servers data ... . 2016.07.16 03:46:16 - Systems & servers data update completed . 2016.07.16 04:16:50 - Updating systems & servers data ... . 2016.07.16 04:16:51 - Systems & servers data update completed I 2016.07.16 04:40:29 - Renewing TLS key . 2016.07.16 04:40:29 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 04:40:30 - OpenVPN > Validating certificate key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 04:40:30 - OpenVPN > VERIFY KU OK . 2016.07.16 04:40:30 - OpenVPN > Validating certificate extended key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 04:40:30 - OpenVPN > VERIFY EKU OK . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 04:47:30 - Updating systems & servers data ... . 2016.07.16 04:47:31 - Systems & servers data update completed . 2016.07.16 05:18:05 - Updating systems & servers data ... . 2016.07.16 05:18:06 - Systems & servers data update completed I 2016.07.16 05:40:30 - Renewing TLS key . 2016.07.16 05:40:30 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 05:40:31 - OpenVPN > Validating certificate key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 05:40:31 - OpenVPN > VERIFY KU OK . 2016.07.16 05:40:31 - OpenVPN > Validating certificate extended key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 05:40:31 - OpenVPN > VERIFY EKU OK . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 05:48:36 - Updating systems & servers data ... . 2016.07.16 05:48:37 - Systems & servers data update completed . 2016.07.16 06:19:12 - Updating systems & servers data ... . 2016.07.16 06:19:13 - Systems & servers data update completed I 2016.07.16 06:40:31 - Renewing TLS key . 2016.07.16 06:40:31 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 06:40:32 - OpenVPN > Validating certificate key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 06:40:32 - OpenVPN > VERIFY KU OK . 2016.07.16 06:40:32 - OpenVPN > Validating certificate extended key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 06:40:32 - OpenVPN > VERIFY EKU OK . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 06:49:47 - Updating systems & servers data ... . 2016.07.16 06:49:48 - Systems & servers data update completed . 2016.07.16 07:20:23 - Updating systems & servers data ... . 2016.07.16 07:20:24 - Systems & servers data update completed I 2016.07.16 07:40:32 - Renewing TLS key . 2016.07.16 07:40:32 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 07:40:34 - OpenVPN > TLS: soft reset sec=0 bytes=5686342/0 pkts=37009/0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 07:40:34 - OpenVPN > Validating certificate key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY KU OK . 2016.07.16 07:40:34 - OpenVPN > Validating certificate extended key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 07:40:34 - OpenVPN > VERIFY EKU OK . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 07:50:59 - Updating systems & servers data ... . 2016.07.16 07:51:00 - Systems & servers data update completed . 2016.07.16 08:21:35 - Updating systems & servers data ... . 2016.07.16 08:21:37 - Systems & servers data update completed I 2016.07.16 08:40:34 - Renewing TLS key . 2016.07.16 08:40:34 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 08:40:35 - OpenVPN > Validating certificate key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 08:40:35 - OpenVPN > VERIFY KU OK . 2016.07.16 08:40:35 - OpenVPN > Validating certificate extended key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 08:40:35 - OpenVPN > VERIFY EKU OK . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 08:52:12 - Updating systems & servers data ... . 2016.07.16 08:52:13 - Systems & servers data update completed . 2016.07.16 09:22:46 - Updating systems & servers data ... . 2016.07.16 09:22:47 - Systems & servers data update completed I 2016.07.16 09:40:35 - Renewing TLS key . 2016.07.16 09:40:35 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 09:40:36 - OpenVPN > Validating certificate key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 09:40:36 - OpenVPN > VERIFY KU OK . 2016.07.16 09:40:36 - OpenVPN > Validating certificate extended key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 09:40:36 - OpenVPN > VERIFY EKU OK . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 09:53:22 - Updating systems & servers data ... . 2016.07.16 09:53:23 - Systems & servers data update completed . 2016.07.16 10:23:58 - Updating systems & servers data ... . 2016.07.16 10:23:58 - Systems & servers data update completed I 2016.07.16 10:40:36 - Renewing TLS key . 2016.07.16 10:40:36 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 10:40:37 - OpenVPN > TLS: soft reset sec=0 bytes=258557956/0 pkts=300692/0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:40:37 - OpenVPN > Validating certificate key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY KU OK . 2016.07.16 10:40:37 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:40:37 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:33 - Updating systems & servers data ... . 2016.07.16 10:54:36 - OpenVPN > Connection reset, restarting [-1] . 2016.07.16 10:54:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.16 10:54:36 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.16 10:54:36 - Disconnecting . 2016.07.16 10:54:36 - Management - Send 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.16 10:54:36 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.16 10:54:36 - OpenVPN > Exiting due to fatal error . 2016.07.16 10:54:37 - Connection terminated. . 2016.07.16 10:54:37 - Systems & servers data update completed I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:54:50 - Checking authorization ... ! 2016.07.16 10:54:50 - Connecting to Algieba (Sweden, Uppsala) . 2016.07.16 10:54:51 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.16 10:54:51 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.16 10:54:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.16 10:54:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.16 10:54:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.16 10:54:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.16 10:54:52 - OpenVPN > TCP connection established with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=d15a8dca c995bc1d . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:54:52 - OpenVPN > Validating certificate key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:54:52 - OpenVPN > VERIFY KU OK . 2016.07.16 10:54:52 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:54:52 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.16 10:54:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.190 255.255.0.0' . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.16 10:54:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.16 10:54:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.16 10:54:57 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.16 10:54:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.16 10:54:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.190/255.255.0.0 [sUCCEEDED] . 2016.07.16 10:54:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.190/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.16 10:54:57 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.16 10:55:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - Starting Management Interface . 2016.07.16 10:55:02 - OpenVPN > Initialization Sequence Completed I 2016.07.16 10:55:02 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:55:02 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:55:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.16 10:55:03 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:55:03 - Flushing DNS I 2016.07.16 10:55:04 - Checking DNS ! 2016.07.16 10:55:05 - Connected. . 2016.07.16 10:55:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.16 10:55:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.16 11:25:14 - Updating systems & servers data ... . 2016.07.16 11:25:17 - Systems & servers data update completed . 2016.07.16 11:54:54 - OpenVPN > TLS: soft reset sec=0 bytes=141395814/0 pkts=215960/0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 11:54:54 - OpenVPN > Validating certificate key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY KU OK . 2016.07.16 11:54:54 - OpenVPN > Validating certificate extended key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 11:54:54 - OpenVPN > VERIFY EKU OK . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 11:55:51 - Updating systems & servers data ... . 2016.07.16 11:55:52 - Systems & servers data update completed . 2016.07.16 12:26:30 - Updating systems & servers data ... . 2016.07.16 12:26:31 - Systems & servers data update completed I 2016.07.16 12:54:54 - Renewing TLS key . 2016.07.16 12:54:54 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 12:54:55 - OpenVPN > TLS: soft reset sec=0 bytes=272454219/0 pkts=360490/0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 12:54:55 - OpenVPN > Validating certificate key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY KU OK . 2016.07.16 12:54:55 - OpenVPN > Validating certificate extended key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 12:54:55 - OpenVPN > VERIFY EKU OK . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 12:57:10 - Updating systems & servers data ... . 2016.07.16 12:57:11 - Systems & servers data update completed . 2016.07.16 13:27:56 - Updating systems & servers data ... . 2016.07.16 13:27:58 - Systems & servers data update completed I 2016.07.16 13:54:55 - Renewing TLS key . 2016.07.16 13:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 13:54:56 - OpenVPN > TLS: soft reset sec=0 bytes=150296496/0 pkts=248976/0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 13:54:56 - OpenVPN > Validating certificate key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY KU OK . 2016.07.16 13:54:56 - OpenVPN > Validating certificate extended key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 13:54:56 - OpenVPN > VERIFY EKU OK . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 13:58:48 - Updating systems & servers data ... . 2016.07.16 13:58:50 - Systems & servers data update completed . 2016.07.16 14:29:36 - Updating systems & servers data ... . 2016.07.16 14:29:37 - Systems & servers data update completed I 2016.07.16 14:54:56 - Renewing TLS key . 2016.07.16 14:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 14:54:57 - OpenVPN > TLS: soft reset sec=0 bytes=238603046/0 pkts=356017/0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 14:54:57 - OpenVPN > Validating certificate key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY KU OK . 2016.07.16 14:54:57 - OpenVPN > Validating certificate extended key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 14:54:57 - OpenVPN > VERIFY EKU OK . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 14:59:53 - Updating systems & servers data ... . 2016.07.16 14:59:54 - Systems & servers data update completed . 2016.07.16 15:30:02 - Updating systems & servers data ... . 2016.07.16 15:30:03 - Systems & servers data update completed I 2016.07.16 15:54:57 - Renewing TLS key . 2016.07.16 15:54:57 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 15:54:58 - OpenVPN > TLS: soft reset sec=0 bytes=70346271/0 pkts=148144/0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 15:54:58 - OpenVPN > Validating certificate key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY KU OK . 2016.07.16 15:54:58 - OpenVPN > Validating certificate extended key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 15:54:58 - OpenVPN > VERIFY EKU OK . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 16:00:35 - Updating systems & servers data ... . 2016.07.16 16:00:36 - Systems & servers data update completed . 2016.07.16 16:31:36 - Updating systems & servers data ... . 2016.07.16 16:31:37 - Systems & servers data update completed I 2016.07.16 16:54:58 - Renewing TLS key . 2016.07.16 16:54:58 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 16:55:00 - OpenVPN > TLS: soft reset sec=0 bytes=289003815/0 pkts=406451/0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 16:55:00 - OpenVPN > Validating certificate key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY KU OK . 2016.07.16 16:55:00 - OpenVPN > Validating certificate extended key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 16:55:00 - OpenVPN > VERIFY EKU OK . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 17:01:46 - Updating systems & servers data ... . 2016.07.16 17:01:48 - Systems & servers data update completed . 2016.07.16 17:32:07 - Updating systems & servers data ... . 2016.07.16 17:32:08 - Systems & servers data update completed I 2016.07.16 17:55:00 - Renewing TLS key . 2016.07.16 17:55:00 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 17:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=261338769/0 pkts=368887/0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 17:55:02 - OpenVPN > Validating certificate key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY KU OK . 2016.07.16 17:55:02 - OpenVPN > Validating certificate extended key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 17:55:02 - OpenVPN > VERIFY EKU OK . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 18:02:17 - Updating systems & servers data ... . 2016.07.16 18:02:21 - Systems & servers data update completed . 2016.07.16 18:33:01 - Updating systems & servers data ... . 2016.07.16 18:33:05 - Systems & servers data update completed I 2016.07.16 18:55:01 - Renewing TLS key . 2016.07.16 18:55:01 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 18:55:06 - OpenVPN > Validating certificate key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 18:55:06 - OpenVPN > VERIFY KU OK . 2016.07.16 18:55:06 - OpenVPN > Validating certificate extended key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 18:55:06 - OpenVPN > VERIFY EKU OK . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 19:03:29 - Updating systems & servers data ... . 2016.07.16 19:03:33 - Systems & servers data update completed . 2016.07.16 19:34:20 - Updating systems & servers data ... . 2016.07.16 19:34:21 - Systems & servers data update completed I 2016.07.16 19:55:06 - Renewing TLS key . 2016.07.16 19:55:06 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 19:55:08 - OpenVPN > Validating certificate key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 19:55:08 - OpenVPN > VERIFY KU OK . 2016.07.16 19:55:08 - OpenVPN > Validating certificate extended key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 19:55:08 - OpenVPN > VERIFY EKU OK . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 20:04:20 - Updating systems & servers data ... . 2016.07.16 20:04:22 - Systems & servers data update completed . 2016.07.16 20:34:41 - Updating systems & servers data ... . 2016.07.16 20:34:43 - Systems & servers data update completed I 2016.07.16 20:55:08 - Renewing TLS key . 2016.07.16 20:55:08 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 20:55:10 - OpenVPN > TLS: soft reset sec=0 bytes=299919922/0 pkts=402243/0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 20:55:10 - OpenVPN > Validating certificate key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY KU OK . 2016.07.16 20:55:10 - OpenVPN > Validating certificate extended key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 20:55:10 - OpenVPN > VERIFY EKU OK . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 21:04:51 - Updating systems & servers data ... . 2016.07.16 21:04:56 - Systems & servers data update completed . 2016.07.16 21:35:14 - Updating systems & servers data ... . 2016.07.16 21:35:15 - Systems & servers data update completed I 2016.07.16 21:55:10 - Renewing TLS key . 2016.07.16 21:55:10 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 21:55:12 - OpenVPN > TLS: soft reset sec=0 bytes=325518219/0 pkts=430958/0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 21:55:12 - OpenVPN > Validating certificate key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY KU OK . 2016.07.16 21:55:12 - OpenVPN > Validating certificate extended key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 21:55:12 - OpenVPN > VERIFY EKU OK . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 22:06:16 - Updating systems & servers data ... . 2016.07.16 22:06:18 - Systems & servers data update completed . 2016.07.16 22:37:05 - Updating systems & servers data ... . 2016.07.16 22:37:18 - Systems & servers data update completed I 2016.07.16 22:55:12 - Renewing TLS key . 2016.07.16 22:55:12 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 22:55:14 - OpenVPN > TLS: soft reset sec=0 bytes=269122759/0 pkts=379891/0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 22:55:14 - OpenVPN > Validating certificate key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY KU OK . 2016.07.16 22:55:14 - OpenVPN > Validating certificate extended key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 22:55:14 - OpenVPN > VERIFY EKU OK . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 23:07:35 - Updating systems & servers data ... . 2016.07.16 23:07:36 - Systems & servers data update completed . 2016.07.16 23:38:31 - Updating systems & servers data ... . 2016.07.16 23:38:33 - Systems & servers data update completed I 2016.07.16 23:55:14 - Renewing TLS key . 2016.07.16 23:55:14 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 23:55:18 - OpenVPN > Validating certificate key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 23:55:18 - OpenVPN > VERIFY KU OK . 2016.07.16 23:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 23:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 00:08:51 - Updating systems & servers data ... . 2016.07.17 00:08:59 - Systems & servers data update completed . 2016.07.17 00:39:42 - Updating systems & servers data ... . 2016.07.17 00:39:43 - Systems & servers data update completed I 2016.07.17 00:55:16 - Renewing TLS key . 2016.07.17 00:55:16 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 00:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 00:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 00:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 00:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 01:10:19 - Updating systems & servers data ... . 2016.07.17 01:10:20 - Systems & servers data update completed . 2016.07.17 01:40:53 - Updating systems & servers data ... . 2016.07.17 01:40:54 - Systems & servers data update completed . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 01:55:15 - OpenVPN > Validating certificate key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 01:55:15 - OpenVPN > VERIFY KU OK . 2016.07.17 01:55:15 - OpenVPN > Validating certificate extended key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 01:55:15 - OpenVPN > VERIFY EKU OK . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 02:11:42 - Updating systems & servers data ... . 2016.07.17 02:11:44 - Systems & servers data update completed . 2016.07.17 02:42:39 - Updating systems & servers data ... . 2016.07.17 02:42:40 - Systems & servers data update completed I 2016.07.17 02:55:15 - Renewing TLS key . 2016.07.17 02:55:15 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 02:55:17 - OpenVPN > TLS: soft reset sec=0 bytes=194567558/0 pkts=272952/0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 02:55:17 - OpenVPN > Validating certificate key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY KU OK . 2016.07.17 02:55:17 - OpenVPN > Validating certificate extended key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 02:55:17 - OpenVPN > VERIFY EKU OK . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 03:13:09 - Updating systems & servers data ... . 2016.07.17 03:13:11 - Systems & servers data update completed . 2016.07.17 03:44:32 - Updating systems & servers data ... . 2016.07.17 03:44:39 - Systems & servers data update completed I 2016.07.17 03:55:17 - Renewing TLS key . 2016.07.17 03:55:17 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 03:55:18 - OpenVPN > TLS: soft reset sec=0 bytes=1165265937/0 pkts=1309392/0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 03:55:18 - OpenVPN > Validating certificate key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY KU OK . 2016.07.17 03:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 03:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 04:14:58 - Updating systems & servers data ... . 2016.07.17 04:14:59 - Systems & servers data update completed . 2016.07.17 04:45:21 - Updating systems & servers data ... . 2016.07.17 04:45:23 - Systems & servers data update completed I 2016.07.17 04:55:18 - Renewing TLS key . 2016.07.17 04:55:18 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 04:55:19 - OpenVPN > TLS: soft reset sec=0 bytes=233301899/0 pkts=328699/0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 04:55:19 - OpenVPN > Validating certificate key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY KU OK . 2016.07.17 04:55:19 - OpenVPN > Validating certificate extended key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 04:55:19 - OpenVPN > VERIFY EKU OK . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 05:15:32 - Updating systems & servers data ... . 2016.07.17 05:15:34 - Systems & servers data update completed . 2016.07.17 05:45:51 - Updating systems & servers data ... . 2016.07.17 05:45:52 - Systems & servers data update completed I 2016.07.17 05:55:19 - Renewing TLS key . 2016.07.17 05:55:19 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 05:55:20 - OpenVPN > TLS: soft reset sec=0 bytes=212919884/0 pkts=266892/0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 05:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 05:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 05:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 06:16:10 - Updating systems & servers data ... . 2016.07.17 06:16:11 - Systems & servers data update completed . 2016.07.17 06:46:25 - Updating systems & servers data ... . 2016.07.17 06:46:26 - Systems & servers data update completed I 2016.07.17 06:55:20 - Renewing TLS key . 2016.07.17 06:55:20 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 06:55:21 - OpenVPN > TLS: soft reset sec=0 bytes=213225290/0 pkts=259269/0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 06:55:21 - OpenVPN > Validating certificate key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY KU OK . 2016.07.17 06:55:21 - OpenVPN > Validating certificate extended key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 06:55:21 - OpenVPN > VERIFY EKU OK . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 07:16:38 - Updating systems & servers data ... . 2016.07.17 07:16:39 - Systems & servers data update completed . 2016.07.17 07:46:52 - Updating systems & servers data ... . 2016.07.17 07:46:54 - Systems & servers data update completed I 2016.07.17 07:55:21 - Renewing TLS key . 2016.07.17 07:55:21 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 07:55:22 - OpenVPN > TLS: soft reset sec=0 bytes=236101110/0 pkts=319176/0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 07:55:22 - OpenVPN > Validating certificate key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY KU OK . 2016.07.17 07:55:22 - OpenVPN > Validating certificate extended key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 07:55:22 - OpenVPN > VERIFY EKU OK . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 08:17:02 - Updating systems & servers data ... . 2016.07.17 08:17:03 - Systems & servers data update completed . 2016.07.17 08:48:09 - Updating systems & servers data ... . 2016.07.17 08:48:10 - Systems & servers data update completed I 2016.07.17 08:55:22 - Renewing TLS key . 2016.07.17 08:55:22 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 08:55:23 - OpenVPN > TLS: soft reset sec=0 bytes=252179535/0 pkts=365885/0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 08:55:23 - OpenVPN > Validating certificate key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY KU OK . 2016.07.17 08:55:23 - OpenVPN > Validating certificate extended key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 08:55:23 - OpenVPN > VERIFY EKU OK . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 09:19:02 - Updating systems & servers data ... . 2016.07.17 09:19:03 - Systems & servers data update completed . 2016.07.17 09:49:27 - Updating systems & servers data ... . 2016.07.17 09:49:30 - Systems & servers data update completed I 2016.07.17 09:55:23 - Renewing TLS key . 2016.07.17 09:55:23 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 09:55:24 - OpenVPN > TLS: soft reset sec=0 bytes=250581123/0 pkts=320129/0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 09:55:24 - OpenVPN > Validating certificate key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY KU OK . 2016.07.17 09:55:24 - OpenVPN > Validating certificate extended key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 09:55:24 - OpenVPN > VERIFY EKU OK . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 10:20:00 - Updating systems & servers data ... . 2016.07.17 10:20:01 - Systems & servers data update completed . 2016.07.17 10:50:19 - Updating systems & servers data ... . 2016.07.17 10:50:20 - Systems & servers data update completed I 2016.07.17 10:55:24 - Renewing TLS key . 2016.07.17 10:55:24 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 10:55:25 - OpenVPN > TLS: soft reset sec=0 bytes=397505535/0 pkts=484501/0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 10:55:25 - OpenVPN > Validating certificate key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY KU OK . 2016.07.17 10:55:25 - OpenVPN > Validating certificate extended key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 10:55:25 - OpenVPN > VERIFY EKU OK . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:04:25 - OpenVPN > write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054) . 2016.07.17 11:04:25 - OpenVPN > Connection reset, restarting [-1] ! 2016.07.17 11:04:25 - Disconnecting . 2016.07.17 11:04:31 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.17 11:04:40 - OpenVPN > Restart pause, 5 second(s) . 2016.07.17 11:04:42 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:44 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:04:44 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.17 11:04:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.17 11:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:46 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:46 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:46 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:51 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:52 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Closing TUN/TAP interface . 2016.07.17 11:04:54 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.07.17 11:04:57 - Connection terminated. I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:05:42 - Checking authorization ... ! 2016.07.17 11:05:42 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.17 11:05:45 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.17 11:05:45 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.17 11:05:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.17 11:05:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.17 11:05:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:05:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.145:443 [nonblock] . 2016.07.17 11:05:46 - OpenVPN > TCP connection established with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=e4192879 ebb234b9 . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 11:05:47 - OpenVPN > Validating certificate key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 11:05:47 - OpenVPN > VERIFY KU OK . 2016.07.17 11:05:47 - OpenVPN > Validating certificate extended key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 11:05:47 - OpenVPN > VERIFY EKU OK . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:05:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.17 11:05:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.195 255.255.0.0' . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.17 11:05:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.17 11:05:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.17 11:05:53 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.17 11:05:53 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.17 11:05:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.195/255.255.0.0 [sUCCEEDED] . 2016.07.17 11:05:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.195/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.17 11:05:53 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.17 11:05:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.17 11:05:57 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:57 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:57 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:57 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:58 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:58 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - Starting Management Interface . 2016.07.17 11:05:58 - OpenVPN > Initialization Sequence Completed I 2016.07.17 11:05:58 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:59 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:59 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.17 11:06:00 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:06:01 - Flushing DNS I 2016.07.17 11:06:04 - Checking DNS ! 2016.07.17 11:06:07 - Connected. . 2016.07.17 11:06:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.17 11:06:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  23. Hello ! So they let me out of my cell today, which means I have a lot of pent-up nitpicking energy stored, haha ​At the bottom of this post, there's a respectful critique of how Air handles the explaining of this service to newcomers and my proposed solution. My main arguments for improving the Air service are: - This post about new-people seemingly not feeling welcome. - And this post about Community Mods & more interaction from Air. As the subtext to this forum reads: "Have some feedback and input to share? Don't be shy and drop us a note. We want to hear from you and strive to make our service better and more user friendly for our guests and members alike." So as they say, Challenge Accepted, Good Sir. Time to unleash my inner OCD pokemon! - Introduction & explaining the madness I'd like to post a series of things which I think need some changes; such as the spelling & grammar of various posts. I understand if English isn't the native language of various Staff members and that's fine; that's why I'd like to lend a helping hand. I don't know if it would be wiser to post all this in a support ticket, because it can amount to a lot of content and perhaps by making it public, more people can contribute and then we can keep it nicely organised in one place. I realise it can sound very condescending, patronizing and/or rude to suggest changes in spelling & grammar, so to be clear, it's just because I currently have an urge to help out; I have the utmost respect for AirVPN Staff & those which contribute positively to the community :]. Why does it matter how things are spelled and such? Because appearances, user-friendliness & attention to detail matter, both in terms of technical subjects and non-technical subjects. When I first started, I thought some of the how-tos could use some slight changes, because it was sometimes massively confusing to juggle the technical explanations with the sometimes unclear or vague wording that accompanied them. I like to think that it's AirVPNs attention to security & privacy details which make it so great; so why should the presentational details of the site be any different? :]. I hope it'll be satisfactory & easy for the Air Staff to just copy/paste the corrected texts in, if they decide to make use of them. I'll of course not change the spirit/content of anything. If you have any input, please feel free to make a post. These are just corrections based on what I think sounds right; we're all different :]. I'd like it if the Staff could clarify something in the "About Us" section. Blue text = My changes/corrections. (Sometimes the original isn't wrong, but could just be clearer, hence changes). Red text = The item should be deleted. (In my humble opinion, thank you) Main AirVPN Pages This should cover the entire AirVPN site, except individual posts in the FAQ and the much-dread ToS - Mission Page Corrections - Technical Specs Page Corrections - About Us Page Corrections I'm not sure what was trying to be expressed at the bottom of the article regarding "harsh contrasts against a project of sharing data, etc. etc." Can someone elaborate? Was there some sort of cross-VPN provider cooperation, wherein user data was or was going to be shared? Or was it meant to say that AirVPN was the opposite of all the other providers? Also, I suggest removing the very last bit "(we'll have some news on that probably within the first half of 2013)." since that's quite old and perhaps shouldn't be on an "About Us" page . - Plans Page Corrections "Accepted" sounds much more natural to me than "Allowed" Payment Processors. Oh and the period at the end of Free Trial access should go away too, in order to conform with the other headings. Also, on the Enter page, it's not called OS X anymore, as Apple renamed it MacOS. - Ping Matrix Page Corrections I'm not sure I understand this one correctly. Please say so, if that's the case. - Top Users Page Corrections - Config Generator "More Help" Page Corrections I'm not sure what's meant by "unique download" here. Unique zip archives for each file maybe? - Websites Support Page Corrections - Databases Page Corrections - Client Software Platforms / Environment Pages Corrections - Privacy Notice and Terms Page Corrections I assume it really was "extra-EU" and not "extra-UE". If not, what's UE? I hope it's okay I skip the ToS Explanatory Posts Here's where I would like to say something. A slight critique. I'm really glad that Air Staff have taken the time to put up such nice FAQs.I'm likewise also really glad that they're extremely knowledgeable and can explain things in a technical way.However... As I also said in my new users guide, the main problem with Air is that it's too technical, when it's not needed. This is GREAT for IT-people, but not everyone else.I mean, it's fine to be technical. But I would like to see it either be "toned down" a little in some places, such as the FAQs, where it's very likely that new people will go or:Alternatively, one could provide non-technical explanations alongside the technical ones. Perhaps in spoilers? I LOVE spoilers lol.Case in point, in the FAQ titled "What is a VPN?". The explanations are great and for technical people, it's borderline pornography. But really, if someone doesn't know what a VPN even is, what are the odds of them understanding what things like this mean: I genuinely think that most new users, especially those who don't have an interest in IT, will have a seizure. An FAQ is, I think, meant to leave people with less questions, not more of them. After reading that, I'm sure many would be asking things like: What's a default gateway push? Is it dangerous?What's encapsulation?What's UDP & TCP?Which stream? Twitch.com?HTTP? Socks? Proxy???I of course don't want to sacrifice form or function for the sake of making things ultra-easy for everyone. We can hang a sign on the door saying "Brain Required" if you wish. But it has to be said that attention to things like this, helps us all in one way or another. Air draws in more customers, which means one of the best VPNs gets to keep running. More people see what a quality VPN service is like & perhaps more services like Air will appear. Likewise, more people protected on the internet is a good thing in general. Plus, all the hardwork & passion Air Staff put into this excellent service, won't mean a thing if no one knows how to use it; that's just a fact really. Our aim, in my view, should be to make the service as welcoming as possible, without sacrificing the aforementioned form or function; which is also one of the biggest problems with modern encryption & thus a barrier to mass-adoption. After all, then there'd be no excuse for people to not use AirVPN and we can finally call them on their bluff eh - Original Text - Attempted Example Of Simplified Text What do you think? Sure, it's missing some details and maybe it's not all that accurate, but if it gets the main point across, so what? As I said, we could just make spoilers for both versions. If Air wants, I'll gladly help make more of such explanations for the other things, since I'm quite good at doing so; mainly because I hardly understand it myself lmao, but shhh Thank you for reading and as always, Thank you to AirVPN & Staff for providing this excellent service, as well as the AirVPN community for keeping this place going strong ! I want to know one thing: has Air got any plans on translating the service into different languages? I think it would be so great if they crowd-sourced this. Anyhow, if you spot anything I missed or disagree with a correction, feel free to tell me! Thanks. Now if you'll excuse me, my bed misses me, lol.
  24. Hello, This is my first VPN - so far so good. The good - lots of servers! The bad - sometimes have to log on more than once. (rare) - I get a connection, but no internet. disconnect reconnect, I am usually good I installed the TAP9 adapter, but still for browser that have webrtc that can't be disabled - Chrome. My IP still comes through. Is that just a browser issue? Or can I do something about it. I do not like that!!!! Mr. V
  25. I'm trying to use the portable version (no mono) of the client on Linux Mint. When I try to connect to a server I get an error "OpenVPN is already running". I don't think I have anything running in background that would cause this message to appear. I have one more VPN client installed on my machine from other provider but I have to manually start it. I checked on System Monitor for processes with "vpn" in name and I didn't find anything. Do you know what may cause this and how to solve the issue?
×
×
  • Create New...