Jump to content
Not connected, Your IP: 54.236.35.159

Search the Community

Showing results for tags 'AirVPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 183 results

  1. Hi I have never been able to connect with the AirVPN client on OSX Sierra. It connects through the Windows client, Tunnelblick and OpenVPN but I would like to use the AirVPN client for more control. Can someone please suggest something. Here's my log:
  2. Hello, I have a question that maybe someone more knowledgeable can answer. I have a computer at home that runs airvpn client and a remote computer. I want to be able to connect from either computer to another one with ssh. Without airvpn client, everything works (obviously). If I run airvpn without network lock, I can ssh from home to remote (it goes via the AirVPN server) but not from remote to home. I tried to start airvpn with the parameter "routes.custom=my.remote.ip.addr,255.255.255.255,out" but it didn't help - the required route was not added to the routing table. However, that problem was easily solved: I added the route separately with "route add -host my.remote.ip.address gw 192.168.1.1" and all was well: ssh works from home to remote and from remote to home bypassing AirVPN as I want it to do. Now, I enable network lock. This time I need to add "allowed IP" parameter to be able to ssh from home to remote: ./airvpn -cli -connect -netlock -login=**** password=**** netlock.allowed_ips=my.remote.ip.addr But ssh from remote to home is blocked by the firewall. I can't find any airvpn parameter that can be used to create custom firewall rules. So I ended up with adding the required rule myself. Before: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 177 16717 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 93 8963 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 26 4651 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1890 460K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 6 502 DROP all -- any any anywhere anywhere Add the rule: iptables -t filter -I INPUT 9 -i eth0 -p tcp -s my.remote.ip.addr --dport 22 -j ACCEPT After: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 182 17197 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 107 10296 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 41 6945 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1981 480K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 0 0 ACCEPT tcp -- eth0 any my.remote.ip.addr anywhere tcp dpt:22 10 6 502 DROP all -- any any anywhere anywhere Now everything works again, but the question remains: what is the best way to achieve that ? In the worst case scenario, I can just start airvpn in the background, wait a minute or so and then run iptables with my additional rule. But that looks ugly. Can anyone think of a better way ? Maybe some "event.session..." or "event.vpn..." parameter will do the trick ? Thanks for any help.
  3. Hi, I'm curious as to why AirVPN DNS servers do not support OpenNIC TLDs, and only seem to recognize ICANN domains even though AirVPN said they no longer recognize ICANN's authority. Any details would be appreciated. Thanks!
  4. hello there when deactivate network lock and exit from Eddie on windows 7 I don't have internet any help Thank you
  5. EDIT: I realize that without developer mode enabled I can not connect to Air via ChromeOS.
  6. Hello there ​ ​I have setup in pfsense airvpn DNS Resolver and I am trying to setup internal DNS server with Ubuntu server. In order to do so I need a DNS Forwarder. How can I use airvpn DNS ? so I won't have any dns leaks from my internal network ​Thank you ​ ​
  7. Is anyone able to get good speeds on Alcor? The most i was able to get was 4-5 mbits/second. Other servers nearby in Latvia and Lithuania can get 20-40 mbits per second.
  8. Just curious why Netherlands is the most used country aside from having the most servers. I always thought Sweden and Switzerland had better laws regarding privacy and filesharing. Could someone inform me of Netherlands benefits over other locations in Europe aside from having central peering? I mean, is there a non technical reason for it or is the peering the only thing that makes it preferable to other countries in Europe?
  9. Dears, I've followed the tutorial on how to connect to AirVPN through DD-WRT but it seems that I can't do it on my own So I would appreciate your help The error I'm getting is: Clientlog: 20161112 18:22:31 N TLS Error: TLS handshake failed 20161112 18:22:31 I SIGUSR1[soft tls-error] received process restarting 20161112 18:22:31 Restart pause 2 second(s) 20161112 18:22:33 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:22:33 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:22:33 I UDPv4 link local: [undef] 20161112 18:22:33 I UDPv4 link remote: [AF_INET]109.232.227.148:443 20161112 18:23:33 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:23:33 N TLS Error: TLS handshake failed 20161112 18:23:33 I SIGUSR1[soft tls-error] received process restarting 20161112 18:23:33 Restart pause 2 second(s) 20161112 18:23:35 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:23:35 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:23:35 I UDPv4 link local: [undef] 20161112 18:23:35 I UDPv4 link remote: [AF_INET]109.232.227.148:443 20161112 18:24:35 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:24:35 N TLS Error: TLS handshake failed 20161112 18:24:35 I SIGUSR1[soft tls-error] received process restarting 20161112 18:24:35 Restart pause 2 second(s) 20161112 18:24:37 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:24:37 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:24:39 I UDPv4 link local: [undef] 20161112 18:24:39 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'state' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'status 2' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:07 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:25:07 D MANAGEMENT: CMD 'log 500' 20161112 18:25:07 MANAGEMENT: Client disconnected 20161112 18:25:39 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:25:39 N TLS Error: TLS handshake failed 20161112 18:25:39 I SIGUSR1[soft tls-error] received process restarting 20161112 18:25:39 Restart pause 2 second(s) 20161112 18:25:41 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:25:41 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:25:41 I UDPv4 link local: [undef] 20161112 18:25:41 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:26:41 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:26:41 N TLS Error: TLS handshake failed 20161112 18:26:41 I SIGUSR1[soft tls-error] received process restarting 20161112 18:26:41 Restart pause 2 second(s) 20161112 18:26:43 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:26:43 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:26:43 I UDPv4 link local: [undef] 20161112 18:26:43 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:27:43 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:27:43 N TLS Error: TLS handshake failed 20161112 18:27:43 I SIGUSR1[soft tls-error] received process restarting 20161112 18:27:43 Restart pause 2 second(s) 20161112 18:27:45 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:27:45 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:27:45 I UDPv4 link local: [undef] 20161112 18:27:45 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:28:46 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:28:46 N TLS Error: TLS handshake failed 20161112 18:28:46 I SIGUSR1[soft tls-error] received process restarting 20161112 18:28:46 Restart pause 2 second(s) 20161112 18:28:48 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:28:48 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:28:48 I UDPv4 link local: [undef] 20161112 18:28:48 I UDPv4 link remote: [AF_INET]213.152.162.103:443 20161112 18:29:48 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:29:48 N TLS Error: TLS handshake failed 20161112 18:29:48 I SIGUSR1[soft tls-error] received process restarting 20161112 18:29:48 Restart pause 2 second(s) 20161112 18:29:50 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:29:50 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:29:52 I UDPv4 link local: [undef] 20161112 18:29:52 I UDPv4 link remote: [AF_INET]213.152.161.132:443 20161112 18:30:52 N TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 20161112 18:30:52 N TLS Error: TLS handshake failed 20161112 18:30:52 I SIGUSR1[soft tls-error] received process restarting 20161112 18:30:52 Restart pause 2 second(s) 20161112 18:30:54 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20161112 18:30:54 Socket Buffers: R=[180224->131072] S=[180224->131072] 20161112 18:30:54 I UDPv4 link local: [undef] 20161112 18:30:54 I UDPv4 link remote: [AF_INET]213.152.161.132:443 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'state' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'status 2' 20161112 18:30:55 MANAGEMENT: Client disconnected 20161112 18:30:55 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20161112 18:30:55 D MANAGEMENT: CMD 'log 500' 19700101 01:00:00 ca /tmp/openvpncl/ca.crt cert /tmp/openvpncl/client.crt key /tmp/openvpncl/client.key management 127.0.0.1 16 management-log-cache 100 verb 3 mute 3 syslog writepid /var/run/openvpncl.pid client resolv-retry infinite nobind persist-key persist-tun script-security 2 dev tun1 proto udp cipher aes-256-cbc auth sha1 remote nl.vpn.airdns.org 443 comp-lzo yes tls-client tun-mtu 1500 mtu-disc yes ns-cert-type server fast-io tun-ipv6 tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 Can someone please help me ? I've attached my config in DD-WRT Thanks.
  10. I've recently purchased AirVPN and set up the client for usage with two windows devices, however I'm having issues with one of my Linux systems. In the first instance, when trying to install the client via the package installer, I received the message: Error: Dependency is not satisfiable: "libmono-system-runtime2.0-cil" ... Since I couldn't use the installer, I downloaded the mobile client instead. Everything seemed to be running smoothly, except when I ran a check on ipleak.net, I found that my UK details were displayed along with the foreign IP from the VPN. My accurate location was also shown on the Google Maps image at the bottom of the screen. This is not the case with either of my windows devices. In the windows instances, the only addresses and locations shown are those coming from the VPN. Also, the ipleaks check reads: "AirVPN Exit Node: No." With both my windows devices, this section reads: "AirVPN Exit Node: Yes." Forgive me if I sound foolish, but I really am confused as to what the issue could be. Any help would be greatly appreciated.
  11. Hi guys, I've subscribed to the Airvpn service about 4 months ago and I'm very happy with it. Nevertheless, as a Linux user (currently Lubuntu 16.04) which isn't using the client option, it was becoming somewhat annoying to turn on and turn off the openvpn and the stunnel in different terminals every time. Few days ago I sat and wrote a small CLI script in python, that is automating the process of connecting and disconnecting to the Airvpn service. The script can be found here: https://github.com/hemulin/airvpn_toggler Simply put, what it does is: When turning on - 1) Scanning the configs files folder and asking you from which country you wish to exit 2) After you choose a country, it turns on the stunnel as a background process and waiting for it to finish the initialization 3) After the stunnel init has finished, it turns on the openvpn as a background process and waiting for it to finish init. 4) After the openvpn has finished its init, the script validates that the external IP has changed and if yes, adding a system tray indicator to show it is connected. When turning off - 1) Killing the system tray indicator, the openvpn and the stunnel processes. 2) Validating that the external IP has changed. Currently it is working well for me, but I still consider it to be a "work in progress", so (1) I still improves it and (2) Feel free to ask for features (and of course, forks and pull requests are welcome). Cheers, Hemulin
  12. Hi, Every time I start up the AirVPN client on OS X, it prompts for admin credentials ("AirVPN wants to make changes. Type your password to allow this."). My situation is such, that I need to launch AirVPN automatically and unintrusively on computer startup - without this dialog popping up every time. I've tried changing the owner of the app to root, and I've also tried an AppleScript as such: do shell script "sudo open -a /Applications/AirVPN.app" user name "User" password "PW" with administrator privileges but still no go, keeps asking for privileges. Is there a certain file that AirVPN is trying to modify that should perhaps be writable? Or how do I otherwise get around this? I've seen several similar threads on this forum, but so far no answer. This is crucial for me to keep using AirVPN service. If it is not possible, please let me know as well so I can look for a different solution. Thank you for your time!
  13. Two different topics in the same post since I can only make a single post a day. Sorry. First, what is the proper way to set the.ovpn configuration file in order to enable VPN through Tor? I have attempted using 127.0.0.1 as the SOCKS proxy but that has not worked. Maybe it has something to do with the control port? Second, I have been able to get Eddie started on CentOS 7, but for some reason, Eddie does not connect to any server. I used all default settings once, and then disabled DNS check. Posting relevant log below: I 2016.09.30 12:22:37 - Session starting. I 2016.09.30 12:22:38 - Checking authorization ... ! 2016.09.30 12:22:38 - Connecting to Gemma (Canada, Vancouver) . 2016.09.30 12:22:38 - OpenVPN > OpenVPN 2.3.12 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Aug 23 2016 . 2016.09.30 12:22:38 - OpenVPN > library versions: OpenSSL 1.0.1e-fips 11 Feb 2013, LZO 2.06 . 2016.09.30 12:22:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 12:22:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 12:22:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link remote: [AF_INET]##.##.###.###:443 . 2016.09.30 12:23:10 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2016.09.30 12:23:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 12:23:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2016.09.30 12:23:15 - Disconnecting . 2016.09.30 12:23:15 - Connection terminated. I 2016.09.30 12:23:16 - Cancel requested. ! 2016.09.30 12:23:16 - Session terminated. If any advancements have been made in either issues, I would greatly appreciate any news - even if it's bad news.
  14. Hello everyone I have a problem with Deluge when used with AirVPN, under Eddie client, v.2.10.3. If i don't activate AirVPN, Deluge is downloading at about 4MiB/s for a random debian image. If i do the same with AirVPN activated, my download speed becomes really slow, never above 40Kib/s. I've tried a lot of things. Changing server, configuring Eddie to use some other ports like SSL, SSH and other alternative ports, tried some parameters in Deluge too... And no changes... I double checked too that the port set in Deluge parameters is forwarded in my client interface on AirVPN website and still no changes. I noticed that my port forwarding in AirVPN website now indicates some bad result when I press the "check" button (not reachable, error 111). Why is it so now ? Other thing I noticed, when Deluge is started, i can barely surf the web, it's veeeeeeery slow. Seems like I have not only one problem, but at least two... Any suggestions ? Here's my config for Deluge : And my port forwarding in AirVPN website interface : Thanks in advance
  15. Hello, It seems AirVPN client is not compatible with standard RPi2 Debian. After install it's not possible to launch AirVVPN client, it just closes. Log: http://pastebin.com/N4sxfg2v Mono version: Mono JIT compiler version 3.2.8 (Debian 3.2.8+dfsg-10) Copyright © 2002-2014 Novell, Inc, Xamarin Inc and Contributors. www.mono-project.comTLS: __threadSIGSEGV: normalNotifications: epollArchitecture: armel,vfp+hardDisabled: noneMisc: softdebug LLVM: supported, not enabled.GC: sgen
  16. Hello! I found an issue... When using the Testpage of AirVPN for DNS- and WebRTC-Leaks (www.ipleak.net) it's actually not showing WebRTC-Leaks, although they are there! Under circumstances this can cause serious trouble for the VPN-Users, because when they don't see any leaks, most of them will be sure that there are no leaks - but that can be very false! I discovered clear WebRTC-Leaks on a Windows7-machine + up-to-date Firefox; but ipleak.net only showed me the internal IP leaks! (which are actually not dangerous) I opened 2 Firefox-Windows while connected to a AirVPN-Server and while ipleak.net didn't show real-IP leaks, at the same moment another site clearly showed these WebRTC-leaks (GitHub)! As you can see on the screenshot ipleak.net doesn't show anything suspicious, but Github shows all the leaks including my real Provider-IP + all internal Network IP's; so actually EVERYTHING was leaking and totally broke the anonymity of AirVPN in my Browser! Now I want to know why ipleak.net provides WebRTC-leak-detecion, when it actually not working at all (also tested on Linux!) Try it yourself and you will see what I mean: 1. https://ipleak.net/ 2. https://diafygi.github.io/webrtc-ips/ Please also check my screenshot below! Btw. you can fix that leak easily in your Firefox-Settings! Answers are welcome! regards, me
  17. I understand this is vpn site it would be nice to view the forums and customer pages from an onion address. for the privacy minded folks out there who use tor and vpn together and would like to avoid bad tor exit nodes it would not be to hard for air admins to set this up. installing tor on server is very easy thanks!
  18. Hi, the port forwarding feature caught my attention but I have some doubts. I think I'm completely lost with this. Let's say I have a server running Linux, basically serving a webpage, I have port forwarding enabled on my router so anyone with my external IP address can connect to it. Okay now let's say I don't want to give out my real IP address, if I understand how the VPN port forwarding feature works, I could use a VPN server to serve that webpage and hide my real IP address (I'd have to deactivate port forwarding on my router and configure it with AirVPN) Is that right? So I connect that Linux server through OpenVPN to an AirVPN's server with port forwarding enabled. For a VPN server, which is a single IP address, there could be maybe 50 persons connected to it, we're sharing the server somehow, but those persons could also enable port forwarding, so, what are the limits/ranges? Two different persons on the same server can't port forward a same port? How does it work? Thanks
  19. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  20. Hello ! So they let me out of my cell today, which means I have a lot of pent-up nitpicking energy stored, haha ​At the bottom of this post, there's a respectful critique of how Air handles the explaining of this service to newcomers and my proposed solution. My main arguments for improving the Air service are: - This post about new-people seemingly not feeling welcome. - And this post about Community Mods & more interaction from Air. As the subtext to this forum reads: "Have some feedback and input to share? Don't be shy and drop us a note. We want to hear from you and strive to make our service better and more user friendly for our guests and members alike." So as they say, Challenge Accepted, Good Sir. Time to unleash my inner OCD pokemon! - Introduction & explaining the madness I'd like to post a series of things which I think need some changes; such as the spelling & grammar of various posts. I understand if English isn't the native language of various Staff members and that's fine; that's why I'd like to lend a helping hand. I don't know if it would be wiser to post all this in a support ticket, because it can amount to a lot of content and perhaps by making it public, more people can contribute and then we can keep it nicely organised in one place. I realise it can sound very condescending, patronizing and/or rude to suggest changes in spelling & grammar, so to be clear, it's just because I currently have an urge to help out; I have the utmost respect for AirVPN Staff & those which contribute positively to the community :]. Why does it matter how things are spelled and such? Because appearances, user-friendliness & attention to detail matter, both in terms of technical subjects and non-technical subjects. When I first started, I thought some of the how-tos could use some slight changes, because it was sometimes massively confusing to juggle the technical explanations with the sometimes unclear or vague wording that accompanied them. I like to think that it's AirVPNs attention to security & privacy details which make it so great; so why should the presentational details of the site be any different? :]. I hope it'll be satisfactory & easy for the Air Staff to just copy/paste the corrected texts in, if they decide to make use of them. I'll of course not change the spirit/content of anything. If you have any input, please feel free to make a post. These are just corrections based on what I think sounds right; we're all different :]. I'd like it if the Staff could clarify something in the "About Us" section. Blue text = My changes/corrections. (Sometimes the original isn't wrong, but could just be clearer, hence changes). Red text = The item should be deleted. (In my humble opinion, thank you) Main AirVPN Pages This should cover the entire AirVPN site, except individual posts in the FAQ and the much-dread ToS - Mission Page Corrections - Technical Specs Page Corrections - About Us Page Corrections I'm not sure what was trying to be expressed at the bottom of the article regarding "harsh contrasts against a project of sharing data, etc. etc." Can someone elaborate? Was there some sort of cross-VPN provider cooperation, wherein user data was or was going to be shared? Or was it meant to say that AirVPN was the opposite of all the other providers? Also, I suggest removing the very last bit "(we'll have some news on that probably within the first half of 2013)." since that's quite old and perhaps shouldn't be on an "About Us" page . - Plans Page Corrections "Accepted" sounds much more natural to me than "Allowed" Payment Processors. Oh and the period at the end of Free Trial access should go away too, in order to conform with the other headings. Also, on the Enter page, it's not called OS X anymore, as Apple renamed it MacOS. - Ping Matrix Page Corrections I'm not sure I understand this one correctly. Please say so, if that's the case. - Top Users Page Corrections - Config Generator "More Help" Page Corrections I'm not sure what's meant by "unique download" here. Unique zip archives for each file maybe? - Websites Support Page Corrections - Databases Page Corrections - Client Software Platforms / Environment Pages Corrections - Privacy Notice and Terms Page Corrections I assume it really was "extra-EU" and not "extra-UE". If not, what's UE? I hope it's okay I skip the ToS Explanatory Posts Here's where I would like to say something. A slight critique. I'm really glad that Air Staff have taken the time to put up such nice FAQs.I'm likewise also really glad that they're extremely knowledgeable and can explain things in a technical way.However... As I also said in my new users guide, the main problem with Air is that it's too technical, when it's not needed. This is GREAT for IT-people, but not everyone else.I mean, it's fine to be technical. But I would like to see it either be "toned down" a little in some places, such as the FAQs, where it's very likely that new people will go or:Alternatively, one could provide non-technical explanations alongside the technical ones. Perhaps in spoilers? I LOVE spoilers lol.Case in point, in the FAQ titled "What is a VPN?". The explanations are great and for technical people, it's borderline pornography. But really, if someone doesn't know what a VPN even is, what are the odds of them understanding what things like this mean: I genuinely think that most new users, especially those who don't have an interest in IT, will have a seizure. An FAQ is, I think, meant to leave people with less questions, not more of them. After reading that, I'm sure many would be asking things like: What's a default gateway push? Is it dangerous?What's encapsulation?What's UDP & TCP?Which stream? Twitch.com?HTTP? Socks? Proxy???I of course don't want to sacrifice form or function for the sake of making things ultra-easy for everyone. We can hang a sign on the door saying "Brain Required" if you wish. But it has to be said that attention to things like this, helps us all in one way or another. Air draws in more customers, which means one of the best VPNs gets to keep running. More people see what a quality VPN service is like & perhaps more services like Air will appear. Likewise, more people protected on the internet is a good thing in general. Plus, all the hardwork & passion Air Staff put into this excellent service, won't mean a thing if no one knows how to use it; that's just a fact really. Our aim, in my view, should be to make the service as welcoming as possible, without sacrificing the aforementioned form or function; which is also one of the biggest problems with modern encryption & thus a barrier to mass-adoption. After all, then there'd be no excuse for people to not use AirVPN and we can finally call them on their bluff eh - Original Text - Attempted Example Of Simplified Text What do you think? Sure, it's missing some details and maybe it's not all that accurate, but if it gets the main point across, so what? As I said, we could just make spoilers for both versions. If Air wants, I'll gladly help make more of such explanations for the other things, since I'm quite good at doing so; mainly because I hardly understand it myself lmao, but shhh Thank you for reading and as always, Thank you to AirVPN & Staff for providing this excellent service, as well as the AirVPN community for keeping this place going strong ! I want to know one thing: has Air got any plans on translating the service into different languages? I think it would be so great if they crowd-sourced this. Anyhow, if you spot anything I missed or disagree with a correction, feel free to tell me! Thanks. Now if you'll excuse me, my bed misses me, lol.
  21. Hello, recently since like 1 or 1.5 week my airvpn is having strange behaviour. It now and then suddenly disconnects, and then needs to reconnect / authorize again. Somehow it doesnt feel natural / a pc conflict this problem but i could be wrong. Maybe its important, but these logs no one changed anything like settings not on the network and not on my laptop. The first 2 disconnects i was sleeping, so no user activity on the laptop as well. last disconnect i was browsing. . 2016.07.15 23:11:45 - Systems & servers data update completed . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:23:44 - OpenVPN > Validating certificate key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:23:44 - OpenVPN > VERIFY KU OK . 2016.07.15 23:23:44 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:23:44 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:00 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060) . 2016.07.15 23:40:00 - OpenVPN > Connection reset, restarting [-1] . 2016.07.15 23:40:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.15 23:40:00 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.15 23:40:00 - Disconnecting . 2016.07.15 23:40:00 - Management - Send 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.15 23:40:00 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.15 23:40:00 - OpenVPN > Exiting due to fatal error . 2016.07.15 23:40:01 - Connection terminated. I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:21 - Checking authorization ... ! 2016.07.15 23:40:21 - Connecting to Azmidiske (Sweden, Uppsala) . 2016.07.15 23:40:21 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.15 23:40:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.15 23:40:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.15 23:40:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.15 23:40:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.15 23:40:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.141:443 [nonblock] . 2016.07.15 23:40:23 - OpenVPN > TCP connection established with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.141:443, sid=f51e2740 2526a036 . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:40:23 - OpenVPN > Validating certificate key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:40:23 - OpenVPN > VERIFY KU OK . 2016.07.15 23:40:23 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:40:23 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.15 23:40:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.224 255.255.0.0' . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.15 23:40:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.15 23:40:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.15 23:40:28 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.15 23:40:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.15 23:40:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.224/255.255.0.0 [sUCCEEDED] . 2016.07.15 23:40:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.224/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.15 23:40:28 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.15 23:40:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.141 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:34 - Starting Management Interface . 2016.07.15 23:40:34 - OpenVPN > Initialization Sequence Completed I 2016.07.15 23:40:34 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:34 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:34 - Flushing DNS I 2016.07.15 23:40:35 - Checking DNS ! 2016.07.15 23:40:36 - Connected. . 2016.07.15 23:40:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.15 23:40:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.15 23:42:20 - Updating systems & servers data ... . 2016.07.15 23:42:21 - Systems & servers data update completed . 2016.07.16 00:12:56 - Updating systems & servers data ... . 2016.07.16 00:12:57 - Systems & servers data update completed . 2016.07.16 00:40:25 - OpenVPN > TLS: soft reset sec=0 bytes=1306479/0 pkts=4397/0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 00:40:26 - OpenVPN > Validating certificate key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY KU OK . 2016.07.16 00:40:26 - OpenVPN > Validating certificate extended key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 00:40:26 - OpenVPN > VERIFY EKU OK . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 00:43:32 - Updating systems & servers data ... . 2016.07.16 00:43:33 - Systems & servers data update completed . 2016.07.16 01:13:50 - Updating systems & servers data ... . 2016.07.16 01:13:52 - Systems & servers data update completed I 2016.07.16 01:40:25 - Renewing TLS key . 2016.07.16 01:40:25 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 01:40:27 - OpenVPN > TLS: soft reset sec=0 bytes=14841430/0 pkts=38149/0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 01:40:27 - OpenVPN > Validating certificate key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY KU OK . 2016.07.16 01:40:27 - OpenVPN > Validating certificate extended key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 01:40:27 - OpenVPN > VERIFY EKU OK . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 01:44:32 - Updating systems & servers data ... . 2016.07.16 01:44:34 - Systems & servers data update completed . 2016.07.16 02:14:41 - Updating systems & servers data ... . 2016.07.16 02:14:42 - Systems & servers data update completed I 2016.07.16 02:40:27 - Renewing TLS key . 2016.07.16 02:40:27 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 02:40:28 - OpenVPN > TLS: soft reset sec=0 bytes=24638897/0 pkts=53803/0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 02:40:28 - OpenVPN > Validating certificate key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY KU OK . 2016.07.16 02:40:28 - OpenVPN > Validating certificate extended key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 02:40:28 - OpenVPN > VERIFY EKU OK . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 02:44:44 - Updating systems & servers data ... . 2016.07.16 02:44:46 - Systems & servers data update completed . 2016.07.16 03:15:37 - Updating systems & servers data ... . 2016.07.16 03:15:39 - Systems & servers data update completed I 2016.07.16 03:40:28 - Renewing TLS key . 2016.07.16 03:40:28 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 03:40:29 - OpenVPN > TLS: soft reset sec=0 bytes=11152806/0 pkts=38076/0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 03:40:29 - OpenVPN > Validating certificate key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY KU OK . 2016.07.16 03:40:29 - OpenVPN > Validating certificate extended key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 03:40:29 - OpenVPN > VERIFY EKU OK . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 03:46:14 - Updating systems & servers data ... . 2016.07.16 03:46:16 - Systems & servers data update completed . 2016.07.16 04:16:50 - Updating systems & servers data ... . 2016.07.16 04:16:51 - Systems & servers data update completed I 2016.07.16 04:40:29 - Renewing TLS key . 2016.07.16 04:40:29 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 04:40:30 - OpenVPN > Validating certificate key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 04:40:30 - OpenVPN > VERIFY KU OK . 2016.07.16 04:40:30 - OpenVPN > Validating certificate extended key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 04:40:30 - OpenVPN > VERIFY EKU OK . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 04:47:30 - Updating systems & servers data ... . 2016.07.16 04:47:31 - Systems & servers data update completed . 2016.07.16 05:18:05 - Updating systems & servers data ... . 2016.07.16 05:18:06 - Systems & servers data update completed I 2016.07.16 05:40:30 - Renewing TLS key . 2016.07.16 05:40:30 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 05:40:31 - OpenVPN > Validating certificate key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 05:40:31 - OpenVPN > VERIFY KU OK . 2016.07.16 05:40:31 - OpenVPN > Validating certificate extended key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 05:40:31 - OpenVPN > VERIFY EKU OK . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 05:48:36 - Updating systems & servers data ... . 2016.07.16 05:48:37 - Systems & servers data update completed . 2016.07.16 06:19:12 - Updating systems & servers data ... . 2016.07.16 06:19:13 - Systems & servers data update completed I 2016.07.16 06:40:31 - Renewing TLS key . 2016.07.16 06:40:31 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 06:40:32 - OpenVPN > Validating certificate key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 06:40:32 - OpenVPN > VERIFY KU OK . 2016.07.16 06:40:32 - OpenVPN > Validating certificate extended key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 06:40:32 - OpenVPN > VERIFY EKU OK . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 06:49:47 - Updating systems & servers data ... . 2016.07.16 06:49:48 - Systems & servers data update completed . 2016.07.16 07:20:23 - Updating systems & servers data ... . 2016.07.16 07:20:24 - Systems & servers data update completed I 2016.07.16 07:40:32 - Renewing TLS key . 2016.07.16 07:40:32 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 07:40:34 - OpenVPN > TLS: soft reset sec=0 bytes=5686342/0 pkts=37009/0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 07:40:34 - OpenVPN > Validating certificate key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY KU OK . 2016.07.16 07:40:34 - OpenVPN > Validating certificate extended key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 07:40:34 - OpenVPN > VERIFY EKU OK . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 07:50:59 - Updating systems & servers data ... . 2016.07.16 07:51:00 - Systems & servers data update completed . 2016.07.16 08:21:35 - Updating systems & servers data ... . 2016.07.16 08:21:37 - Systems & servers data update completed I 2016.07.16 08:40:34 - Renewing TLS key . 2016.07.16 08:40:34 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 08:40:35 - OpenVPN > Validating certificate key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 08:40:35 - OpenVPN > VERIFY KU OK . 2016.07.16 08:40:35 - OpenVPN > Validating certificate extended key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 08:40:35 - OpenVPN > VERIFY EKU OK . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 08:52:12 - Updating systems & servers data ... . 2016.07.16 08:52:13 - Systems & servers data update completed . 2016.07.16 09:22:46 - Updating systems & servers data ... . 2016.07.16 09:22:47 - Systems & servers data update completed I 2016.07.16 09:40:35 - Renewing TLS key . 2016.07.16 09:40:35 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 09:40:36 - OpenVPN > Validating certificate key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 09:40:36 - OpenVPN > VERIFY KU OK . 2016.07.16 09:40:36 - OpenVPN > Validating certificate extended key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 09:40:36 - OpenVPN > VERIFY EKU OK . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 09:53:22 - Updating systems & servers data ... . 2016.07.16 09:53:23 - Systems & servers data update completed . 2016.07.16 10:23:58 - Updating systems & servers data ... . 2016.07.16 10:23:58 - Systems & servers data update completed I 2016.07.16 10:40:36 - Renewing TLS key . 2016.07.16 10:40:36 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 10:40:37 - OpenVPN > TLS: soft reset sec=0 bytes=258557956/0 pkts=300692/0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:40:37 - OpenVPN > Validating certificate key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY KU OK . 2016.07.16 10:40:37 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:40:37 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:33 - Updating systems & servers data ... . 2016.07.16 10:54:36 - OpenVPN > Connection reset, restarting [-1] . 2016.07.16 10:54:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.16 10:54:36 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.16 10:54:36 - Disconnecting . 2016.07.16 10:54:36 - Management - Send 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.16 10:54:36 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.16 10:54:36 - OpenVPN > Exiting due to fatal error . 2016.07.16 10:54:37 - Connection terminated. . 2016.07.16 10:54:37 - Systems & servers data update completed I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:54:50 - Checking authorization ... ! 2016.07.16 10:54:50 - Connecting to Algieba (Sweden, Uppsala) . 2016.07.16 10:54:51 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.16 10:54:51 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.16 10:54:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.16 10:54:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.16 10:54:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.16 10:54:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.16 10:54:52 - OpenVPN > TCP connection established with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=d15a8dca c995bc1d . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:54:52 - OpenVPN > Validating certificate key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:54:52 - OpenVPN > VERIFY KU OK . 2016.07.16 10:54:52 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:54:52 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.16 10:54:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.190 255.255.0.0' . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.16 10:54:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.16 10:54:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.16 10:54:57 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.16 10:54:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.16 10:54:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.190/255.255.0.0 [sUCCEEDED] . 2016.07.16 10:54:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.190/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.16 10:54:57 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.16 10:55:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - Starting Management Interface . 2016.07.16 10:55:02 - OpenVPN > Initialization Sequence Completed I 2016.07.16 10:55:02 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:55:02 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:55:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.16 10:55:03 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:55:03 - Flushing DNS I 2016.07.16 10:55:04 - Checking DNS ! 2016.07.16 10:55:05 - Connected. . 2016.07.16 10:55:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.16 10:55:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.16 11:25:14 - Updating systems & servers data ... . 2016.07.16 11:25:17 - Systems & servers data update completed . 2016.07.16 11:54:54 - OpenVPN > TLS: soft reset sec=0 bytes=141395814/0 pkts=215960/0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 11:54:54 - OpenVPN > Validating certificate key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY KU OK . 2016.07.16 11:54:54 - OpenVPN > Validating certificate extended key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 11:54:54 - OpenVPN > VERIFY EKU OK . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 11:55:51 - Updating systems & servers data ... . 2016.07.16 11:55:52 - Systems & servers data update completed . 2016.07.16 12:26:30 - Updating systems & servers data ... . 2016.07.16 12:26:31 - Systems & servers data update completed I 2016.07.16 12:54:54 - Renewing TLS key . 2016.07.16 12:54:54 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 12:54:55 - OpenVPN > TLS: soft reset sec=0 bytes=272454219/0 pkts=360490/0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 12:54:55 - OpenVPN > Validating certificate key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY KU OK . 2016.07.16 12:54:55 - OpenVPN > Validating certificate extended key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 12:54:55 - OpenVPN > VERIFY EKU OK . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 12:57:10 - Updating systems & servers data ... . 2016.07.16 12:57:11 - Systems & servers data update completed . 2016.07.16 13:27:56 - Updating systems & servers data ... . 2016.07.16 13:27:58 - Systems & servers data update completed I 2016.07.16 13:54:55 - Renewing TLS key . 2016.07.16 13:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 13:54:56 - OpenVPN > TLS: soft reset sec=0 bytes=150296496/0 pkts=248976/0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 13:54:56 - OpenVPN > Validating certificate key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY KU OK . 2016.07.16 13:54:56 - OpenVPN > Validating certificate extended key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 13:54:56 - OpenVPN > VERIFY EKU OK . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 13:58:48 - Updating systems & servers data ... . 2016.07.16 13:58:50 - Systems & servers data update completed . 2016.07.16 14:29:36 - Updating systems & servers data ... . 2016.07.16 14:29:37 - Systems & servers data update completed I 2016.07.16 14:54:56 - Renewing TLS key . 2016.07.16 14:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 14:54:57 - OpenVPN > TLS: soft reset sec=0 bytes=238603046/0 pkts=356017/0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 14:54:57 - OpenVPN > Validating certificate key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY KU OK . 2016.07.16 14:54:57 - OpenVPN > Validating certificate extended key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 14:54:57 - OpenVPN > VERIFY EKU OK . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 14:59:53 - Updating systems & servers data ... . 2016.07.16 14:59:54 - Systems & servers data update completed . 2016.07.16 15:30:02 - Updating systems & servers data ... . 2016.07.16 15:30:03 - Systems & servers data update completed I 2016.07.16 15:54:57 - Renewing TLS key . 2016.07.16 15:54:57 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 15:54:58 - OpenVPN > TLS: soft reset sec=0 bytes=70346271/0 pkts=148144/0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 15:54:58 - OpenVPN > Validating certificate key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY KU OK . 2016.07.16 15:54:58 - OpenVPN > Validating certificate extended key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 15:54:58 - OpenVPN > VERIFY EKU OK . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 16:00:35 - Updating systems & servers data ... . 2016.07.16 16:00:36 - Systems & servers data update completed . 2016.07.16 16:31:36 - Updating systems & servers data ... . 2016.07.16 16:31:37 - Systems & servers data update completed I 2016.07.16 16:54:58 - Renewing TLS key . 2016.07.16 16:54:58 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 16:55:00 - OpenVPN > TLS: soft reset sec=0 bytes=289003815/0 pkts=406451/0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 16:55:00 - OpenVPN > Validating certificate key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY KU OK . 2016.07.16 16:55:00 - OpenVPN > Validating certificate extended key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 16:55:00 - OpenVPN > VERIFY EKU OK . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 17:01:46 - Updating systems & servers data ... . 2016.07.16 17:01:48 - Systems & servers data update completed . 2016.07.16 17:32:07 - Updating systems & servers data ... . 2016.07.16 17:32:08 - Systems & servers data update completed I 2016.07.16 17:55:00 - Renewing TLS key . 2016.07.16 17:55:00 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 17:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=261338769/0 pkts=368887/0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 17:55:02 - OpenVPN > Validating certificate key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY KU OK . 2016.07.16 17:55:02 - OpenVPN > Validating certificate extended key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 17:55:02 - OpenVPN > VERIFY EKU OK . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 18:02:17 - Updating systems & servers data ... . 2016.07.16 18:02:21 - Systems & servers data update completed . 2016.07.16 18:33:01 - Updating systems & servers data ... . 2016.07.16 18:33:05 - Systems & servers data update completed I 2016.07.16 18:55:01 - Renewing TLS key . 2016.07.16 18:55:01 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 18:55:06 - OpenVPN > Validating certificate key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 18:55:06 - OpenVPN > VERIFY KU OK . 2016.07.16 18:55:06 - OpenVPN > Validating certificate extended key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 18:55:06 - OpenVPN > VERIFY EKU OK . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 19:03:29 - Updating systems & servers data ... . 2016.07.16 19:03:33 - Systems & servers data update completed . 2016.07.16 19:34:20 - Updating systems & servers data ... . 2016.07.16 19:34:21 - Systems & servers data update completed I 2016.07.16 19:55:06 - Renewing TLS key . 2016.07.16 19:55:06 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 19:55:08 - OpenVPN > Validating certificate key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 19:55:08 - OpenVPN > VERIFY KU OK . 2016.07.16 19:55:08 - OpenVPN > Validating certificate extended key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 19:55:08 - OpenVPN > VERIFY EKU OK . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 20:04:20 - Updating systems & servers data ... . 2016.07.16 20:04:22 - Systems & servers data update completed . 2016.07.16 20:34:41 - Updating systems & servers data ... . 2016.07.16 20:34:43 - Systems & servers data update completed I 2016.07.16 20:55:08 - Renewing TLS key . 2016.07.16 20:55:08 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 20:55:10 - OpenVPN > TLS: soft reset sec=0 bytes=299919922/0 pkts=402243/0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 20:55:10 - OpenVPN > Validating certificate key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY KU OK . 2016.07.16 20:55:10 - OpenVPN > Validating certificate extended key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 20:55:10 - OpenVPN > VERIFY EKU OK . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 21:04:51 - Updating systems & servers data ... . 2016.07.16 21:04:56 - Systems & servers data update completed . 2016.07.16 21:35:14 - Updating systems & servers data ... . 2016.07.16 21:35:15 - Systems & servers data update completed I 2016.07.16 21:55:10 - Renewing TLS key . 2016.07.16 21:55:10 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 21:55:12 - OpenVPN > TLS: soft reset sec=0 bytes=325518219/0 pkts=430958/0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 21:55:12 - OpenVPN > Validating certificate key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY KU OK . 2016.07.16 21:55:12 - OpenVPN > Validating certificate extended key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 21:55:12 - OpenVPN > VERIFY EKU OK . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 22:06:16 - Updating systems & servers data ... . 2016.07.16 22:06:18 - Systems & servers data update completed . 2016.07.16 22:37:05 - Updating systems & servers data ... . 2016.07.16 22:37:18 - Systems & servers data update completed I 2016.07.16 22:55:12 - Renewing TLS key . 2016.07.16 22:55:12 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 22:55:14 - OpenVPN > TLS: soft reset sec=0 bytes=269122759/0 pkts=379891/0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 22:55:14 - OpenVPN > Validating certificate key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY KU OK . 2016.07.16 22:55:14 - OpenVPN > Validating certificate extended key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 22:55:14 - OpenVPN > VERIFY EKU OK . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 23:07:35 - Updating systems & servers data ... . 2016.07.16 23:07:36 - Systems & servers data update completed . 2016.07.16 23:38:31 - Updating systems & servers data ... . 2016.07.16 23:38:33 - Systems & servers data update completed I 2016.07.16 23:55:14 - Renewing TLS key . 2016.07.16 23:55:14 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 23:55:18 - OpenVPN > Validating certificate key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 23:55:18 - OpenVPN > VERIFY KU OK . 2016.07.16 23:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 23:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 00:08:51 - Updating systems & servers data ... . 2016.07.17 00:08:59 - Systems & servers data update completed . 2016.07.17 00:39:42 - Updating systems & servers data ... . 2016.07.17 00:39:43 - Systems & servers data update completed I 2016.07.17 00:55:16 - Renewing TLS key . 2016.07.17 00:55:16 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 00:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 00:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 00:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 00:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 01:10:19 - Updating systems & servers data ... . 2016.07.17 01:10:20 - Systems & servers data update completed . 2016.07.17 01:40:53 - Updating systems & servers data ... . 2016.07.17 01:40:54 - Systems & servers data update completed . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 01:55:15 - OpenVPN > Validating certificate key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 01:55:15 - OpenVPN > VERIFY KU OK . 2016.07.17 01:55:15 - OpenVPN > Validating certificate extended key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 01:55:15 - OpenVPN > VERIFY EKU OK . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 02:11:42 - Updating systems & servers data ... . 2016.07.17 02:11:44 - Systems & servers data update completed . 2016.07.17 02:42:39 - Updating systems & servers data ... . 2016.07.17 02:42:40 - Systems & servers data update completed I 2016.07.17 02:55:15 - Renewing TLS key . 2016.07.17 02:55:15 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 02:55:17 - OpenVPN > TLS: soft reset sec=0 bytes=194567558/0 pkts=272952/0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 02:55:17 - OpenVPN > Validating certificate key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY KU OK . 2016.07.17 02:55:17 - OpenVPN > Validating certificate extended key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 02:55:17 - OpenVPN > VERIFY EKU OK . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 03:13:09 - Updating systems & servers data ... . 2016.07.17 03:13:11 - Systems & servers data update completed . 2016.07.17 03:44:32 - Updating systems & servers data ... . 2016.07.17 03:44:39 - Systems & servers data update completed I 2016.07.17 03:55:17 - Renewing TLS key . 2016.07.17 03:55:17 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 03:55:18 - OpenVPN > TLS: soft reset sec=0 bytes=1165265937/0 pkts=1309392/0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 03:55:18 - OpenVPN > Validating certificate key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY KU OK . 2016.07.17 03:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 03:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 04:14:58 - Updating systems & servers data ... . 2016.07.17 04:14:59 - Systems & servers data update completed . 2016.07.17 04:45:21 - Updating systems & servers data ... . 2016.07.17 04:45:23 - Systems & servers data update completed I 2016.07.17 04:55:18 - Renewing TLS key . 2016.07.17 04:55:18 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 04:55:19 - OpenVPN > TLS: soft reset sec=0 bytes=233301899/0 pkts=328699/0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 04:55:19 - OpenVPN > Validating certificate key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY KU OK . 2016.07.17 04:55:19 - OpenVPN > Validating certificate extended key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 04:55:19 - OpenVPN > VERIFY EKU OK . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 05:15:32 - Updating systems & servers data ... . 2016.07.17 05:15:34 - Systems & servers data update completed . 2016.07.17 05:45:51 - Updating systems & servers data ... . 2016.07.17 05:45:52 - Systems & servers data update completed I 2016.07.17 05:55:19 - Renewing TLS key . 2016.07.17 05:55:19 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 05:55:20 - OpenVPN > TLS: soft reset sec=0 bytes=212919884/0 pkts=266892/0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 05:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 05:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 05:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 06:16:10 - Updating systems & servers data ... . 2016.07.17 06:16:11 - Systems & servers data update completed . 2016.07.17 06:46:25 - Updating systems & servers data ... . 2016.07.17 06:46:26 - Systems & servers data update completed I 2016.07.17 06:55:20 - Renewing TLS key . 2016.07.17 06:55:20 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 06:55:21 - OpenVPN > TLS: soft reset sec=0 bytes=213225290/0 pkts=259269/0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 06:55:21 - OpenVPN > Validating certificate key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY KU OK . 2016.07.17 06:55:21 - OpenVPN > Validating certificate extended key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 06:55:21 - OpenVPN > VERIFY EKU OK . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 07:16:38 - Updating systems & servers data ... . 2016.07.17 07:16:39 - Systems & servers data update completed . 2016.07.17 07:46:52 - Updating systems & servers data ... . 2016.07.17 07:46:54 - Systems & servers data update completed I 2016.07.17 07:55:21 - Renewing TLS key . 2016.07.17 07:55:21 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 07:55:22 - OpenVPN > TLS: soft reset sec=0 bytes=236101110/0 pkts=319176/0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 07:55:22 - OpenVPN > Validating certificate key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY KU OK . 2016.07.17 07:55:22 - OpenVPN > Validating certificate extended key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 07:55:22 - OpenVPN > VERIFY EKU OK . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 08:17:02 - Updating systems & servers data ... . 2016.07.17 08:17:03 - Systems & servers data update completed . 2016.07.17 08:48:09 - Updating systems & servers data ... . 2016.07.17 08:48:10 - Systems & servers data update completed I 2016.07.17 08:55:22 - Renewing TLS key . 2016.07.17 08:55:22 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 08:55:23 - OpenVPN > TLS: soft reset sec=0 bytes=252179535/0 pkts=365885/0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 08:55:23 - OpenVPN > Validating certificate key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY KU OK . 2016.07.17 08:55:23 - OpenVPN > Validating certificate extended key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 08:55:23 - OpenVPN > VERIFY EKU OK . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 09:19:02 - Updating systems & servers data ... . 2016.07.17 09:19:03 - Systems & servers data update completed . 2016.07.17 09:49:27 - Updating systems & servers data ... . 2016.07.17 09:49:30 - Systems & servers data update completed I 2016.07.17 09:55:23 - Renewing TLS key . 2016.07.17 09:55:23 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 09:55:24 - OpenVPN > TLS: soft reset sec=0 bytes=250581123/0 pkts=320129/0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 09:55:24 - OpenVPN > Validating certificate key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY KU OK . 2016.07.17 09:55:24 - OpenVPN > Validating certificate extended key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 09:55:24 - OpenVPN > VERIFY EKU OK . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 10:20:00 - Updating systems & servers data ... . 2016.07.17 10:20:01 - Systems & servers data update completed . 2016.07.17 10:50:19 - Updating systems & servers data ... . 2016.07.17 10:50:20 - Systems & servers data update completed I 2016.07.17 10:55:24 - Renewing TLS key . 2016.07.17 10:55:24 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 10:55:25 - OpenVPN > TLS: soft reset sec=0 bytes=397505535/0 pkts=484501/0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 10:55:25 - OpenVPN > Validating certificate key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY KU OK . 2016.07.17 10:55:25 - OpenVPN > Validating certificate extended key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 10:55:25 - OpenVPN > VERIFY EKU OK . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:04:25 - OpenVPN > write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054) . 2016.07.17 11:04:25 - OpenVPN > Connection reset, restarting [-1] ! 2016.07.17 11:04:25 - Disconnecting . 2016.07.17 11:04:31 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.17 11:04:40 - OpenVPN > Restart pause, 5 second(s) . 2016.07.17 11:04:42 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:44 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:04:44 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.17 11:04:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.17 11:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:46 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:46 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:46 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:51 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:52 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Closing TUN/TAP interface . 2016.07.17 11:04:54 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.07.17 11:04:57 - Connection terminated. I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:05:42 - Checking authorization ... ! 2016.07.17 11:05:42 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.17 11:05:45 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.17 11:05:45 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.17 11:05:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.17 11:05:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.17 11:05:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:05:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.145:443 [nonblock] . 2016.07.17 11:05:46 - OpenVPN > TCP connection established with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=e4192879 ebb234b9 . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 11:05:47 - OpenVPN > Validating certificate key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 11:05:47 - OpenVPN > VERIFY KU OK . 2016.07.17 11:05:47 - OpenVPN > Validating certificate extended key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 11:05:47 - OpenVPN > VERIFY EKU OK . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:05:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.17 11:05:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.195 255.255.0.0' . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.17 11:05:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.17 11:05:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.17 11:05:53 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.17 11:05:53 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.17 11:05:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.195/255.255.0.0 [sUCCEEDED] . 2016.07.17 11:05:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.195/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.17 11:05:53 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.17 11:05:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.17 11:05:57 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:57 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:57 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:57 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:58 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:58 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - Starting Management Interface . 2016.07.17 11:05:58 - OpenVPN > Initialization Sequence Completed I 2016.07.17 11:05:58 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:59 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:59 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.17 11:06:00 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:06:01 - Flushing DNS I 2016.07.17 11:06:04 - Checking DNS ! 2016.07.17 11:06:07 - Connected. . 2016.07.17 11:06:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.17 11:06:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  22. As of a few days ago Netflix seems to be blocked when using any airvpn server from all apple platforms that I own ( iphone, ipad, appletv generation 2). If you try to access netflix from iphone and ipad theres only a generic error message about "unable to play the title". On appleTV generation 2&3 theres a specific error message: Netflix 139: NFErr_MC_Authfailure
  23. So, I have been informed by fellow classmates that the use of a VPN on public school wifi is considered a felony under US law under the charge of tampering with a government network. Is this true? How would this hold up in court?
  24. Hello, This is my first VPN - so far so good. The good - lots of servers! The bad - sometimes have to log on more than once. (rare) - I get a connection, but no internet. disconnect reconnect, I am usually good I installed the TAP9 adapter, but still for browser that have webrtc that can't be disabled - Chrome. My IP still comes through. Is that just a browser issue? Or can I do something about it. I do not like that!!!! Mr. V
  25. I'm trying to use the portable version (no mono) of the client on Linux Mint. When I try to connect to a server I get an error "OpenVPN is already running". I don't think I have anything running in background that would cause this message to appear. I have one more VPN client installed on my machine from other provider but I have to manually start it. I checked on System Monitor for processes with "vpn" in name and I didn't find anything. Do you know what may cause this and how to solve the issue?
×
×
  • Create New...