Jump to content
Not connected, Your IP: 216.73.216.170

Search the Community

Showing results for tags 'DNS'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 194 results

  1. Hello everyone. I'm currently troubleshooting my VPN connection and could use some help. Using OpenVPN GUI 2.3.11-I601, VPN connects successfully and fully operational. But using the Eddie client, connections always halted with the message "The remote name could not be resolved." The only way the client can connect is if I have the DNS Switch mode Disabled in Preferences - Advanced - DNS, otherwise the operation stopped while checking route with a statement The operation has timed out. Any insight on where should I start looking would be greatly appreciated, and sorry for any mistakes as English is not my native language. Thank you. Operating system : Windows 10 64 bit All connections set to DHCP (IP and DNS) I 22.37.57 - Session starting. I 22.37.57 - IPv6 disabled. I 22.37.57 - Checking authorization ... ! 22.37.58 - Connecting to Cetus (Canada, Vancouver) . 22.37.59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 22.37.59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 22.37.59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 22.37.59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 22.37.59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 22.37.59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 22.37.59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 22.37.59 - OpenVPN > UDPv4 link local: [undef] . 22.37.59 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443 . 22.37.59 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.249.195:443, sid=6def05a5 c8eb86ab . 22.37.59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 22.37.59 - OpenVPN > Validating certificate key usage . 22.37.59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 22.37.59 - OpenVPN > VERIFY KU OK . 22.37.59 - OpenVPN > Validating certificate extended key usage . 22.37.59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 22.37.59 - OpenVPN > VERIFY EKU OK . 22.37.59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 22.38.01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 22.38.01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 22.38.01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 22.38.01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 22.38.01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 22.38.01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.249.195:443 . 22.38.03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 22.38.04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.219 255.255.0.0' . 22.38.04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 22.38.04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 22.38.04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 22.38.04 - OpenVPN > OPTIONS IMPORT: route options modified . 22.38.04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 22.38.04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 22.38.04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 22.38.04 - OpenVPN > open_tun, tt->ipv6=0 . 22.38.04 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{F5022C7A-40B9-456F-9049-DE3500514C86}.tap . 22.38.04 - OpenVPN > TAP-Windows Driver Version 9.21 . 22.38.04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.219/255.255.0.0 [SUCCEEDED] . 22.38.04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.219/255.255.0.0 on interface {F5022C7A-40B9-456F-9049-DE3500514C86} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 22.38.04 - OpenVPN > Successful ARP Flush on interface [20] {F5022C7A-40B9-456F-9049-DE3500514C86} . 22.38.09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 22.38.09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.249.195 MASK 255.255.255.255 192.168.1.1 . 22.38.09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 22.38.09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 22.38.09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 2 . 22.38.09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 22.38.09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 22.38.09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 22.38.09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 22.38.09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 22.38.09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 22.38.09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 22.38.09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 22.38.09 - Starting Management Interface . 22.38.09 - OpenVPN > Initialization Sequence Completed I 22.38.09 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 22.38.09 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 22.38.09 - Flushing DNS I 22.38.09 - Checking route W 22.38.21 - Checking route, 1° try failed (The operation has timed out) W 22.38.33 - Checking route, 2° try failed (The operation has timed out) W 22.38.33 - Checking route, 3° try failed (The remote name could not be resolved: 'cetus_exit.airservers.org') W 22.38.33 - Checking route, 4° try failed (The remote name could not be resolved: 'cetus_exit.airservers.org') W 22.38.33 - Checking route, 5° try failed (The remote name could not be resolved: 'cetus_exit.airservers.org') W 22.38.33 - The remote name could not be resolved: 'cetus_exit.airservers.org' ! 22.38.33 - Disconnecting . 22.38.33 - Management - Send 'signal SIGTERM' . 22.38.33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 22.38.33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 22.38.33 - OpenVPN > SIGTERM received, sending exit notification to peer . 22.38.38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.249.195 MASK 255.255.255.255 192.168.1.1 . 22.38.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 22.38.38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1 . 22.38.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 22.38.38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 22.38.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 22.38.38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 22.38.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 22.38.38 - OpenVPN > Closing TUN/TAP interface . 22.38.38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 22.38.38 - Connection terminated. I 22.38.38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 22.38.38 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 22.38.40 - Cancel requested. I 22.38.40 - IPv6 restored. ! 22.38.40 - Session terminated.
  2. I have been running AirVPN on this machine without issue for over 2 years. I have my Wireless adapter disabled and only use my Ethernet adapter. Today, when I disconnected from AirVPN, my Ethernet adapter could see everything on my network but could not access the Internet. After troubleshooting, it I've found that the DNS is set to 10.4.0.1 even when disconnected from AirVPN. If I manually change it in the Adapter IPv4 settings (to either dynamic or 8.8.8.8), it does not take effect. I perform an ipconfig /all and the DNS is still 10.4.0.1. If I reboot the computer, same thing. Again, this just started happening today and I made no changes to my machine.
  3. Hey so I'm new to AirVPN and don't know if I'm doing something wrong, but when I try to connect to any server I get put into a constant connect/disconnect loop. From the logs it seems my DNS checking is failing. How can I go about fixing this? ​ ​ ​I 2016.06.08 12:41:43 - Session starting. I 2016.06.08 12:41:43 - IPv6 disabled on network adapter (FT232R USB UART) I 2016.06.08 12:41:43 - IPv6 disabled on network adapter (Ethernet) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Ethernet Adaptor (en4)) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Wi-Fi) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (iPhone USB) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Bluetooth PAN) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (FireWire) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2016.06.08 12:41:44 - Checking authorization ... ! 2016.06.08 12:41:44 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: stunnel 5.17 on x86_64-apple-darwin14.3.0 platform . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015 . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Threading:PTHREAD Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Reading configuration from file /Users/Cameron/.airvpn/fe07179097d02cbd4d2b60104cd3818cea8dd82b7743cf30233f704a1adca703.tmp.ssl . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: UTF-8 byte order mark not detected . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG6[ui]: Initializing service [openvpn] . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Configuration successful . 2016.06.08 12:41:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50663 . 2016.06.08 12:41:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: Failover strategy: round-robin . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: s_connect: connecting 213.152.162.100:443 . 2016.06.08 12:41:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.08 12:41:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: s_connect: connected 213.152.162.100:443 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.12:50664 . 2016.06.08 12:41:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: SNI: sending servername: 213.152.162.100 . 2016.06.08 12:41:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: CERT: Locally installed certificate matched . 2016.06.08 12:41:45 - OpenVPN > Socket Buffers: R=[131072->131072] S=[131072->131072] . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2016.06.08 12:41:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:23734 [nonblock] . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: SSL connected: new session negotiated . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2016.06.08 12:41:46 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.06.08 12:41:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:46 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:23734, sid=3affd201 a6ded6bb . 2016.06.08 12:41:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.08 12:41:46 - OpenVPN > Validating certificate key usage . 2016.06.08 12:41:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.08 12:41:46 - OpenVPN > VERIFY KU OK . 2016.06.08 12:41:46 - OpenVPN > Validating certificate extended key usage . 2016.06.08 12:41:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.08 12:41:46 - OpenVPN > VERIFY EKU OK . 2016.06.08 12:41:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.08 12:41:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.08 12:41:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.08 12:41:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.89 255.255.0.0' . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.08 12:41:49 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.08 12:41:49 - OpenVPN > Opened utun device utun0 . 2016.06.08 12:41:49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.08 12:41:49 - OpenVPN > /sbin/ifconfig utun0 delete . 2016.06.08 12:41:49 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2016.06.08 12:41:49 - OpenVPN > /sbin/ifconfig utun0 10.50.6.89 10.50.6.89 netmask 255.255.0.0 mtu 1500 up . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.6.89 255.255.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 10.50.0.0: gateway 10.50.6.89 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:49 - OpenVPN > add net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:49 - OpenVPN > add net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:49 - Starting Management Interface . 2016.06.08 12:41:49 - OpenVPN > Initialization Sequence Completed I 2016.06.08 12:41:49 - DNS of a network adapter forced (FT232R USB UART) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Ethernet) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Ethernet Adaptor (en4)) . 2016.06.08 12:41:49 - Unknown networksetup output: '' for interface 'Wi-Fi' I 2016.06.08 12:41:49 - DNS of a network adapter forced (iPhone USB) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Bluetooth PAN) I 2016.06.08 12:41:50 - DNS of a network adapter forced (FireWire) I 2016.06.08 12:41:50 - DNS of a network adapter forced (Thunderbolt Bridge) I 2016.06.08 12:41:50 - Flushing DNS I 2016.06.08 12:41:50 - Checking route I 2016.06.08 12:41:50 - Checking DNS E 2016.06.08 12:41:50 - DNS checking failed. . 2016.06.08 12:41:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.08 12:41:50 - Disconnecting . 2016.06.08 12:41:50 - Management - Send 'signal SIGTERM' . 2016.06.08 12:41:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.08 12:41:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.08 12:41:50 - SSL > 2016.06.08 12:41:50 LOG6[0]: Read socket closed (readsocket) . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG6[0]: SSL_shutdown successfully sent close_notify alert . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing . 2016.06.08 12:41:51 - OpenVPN > delete net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG5[0]: Connection closed: 9970 byte(s) sent to SSL, 10271 byte(s) sent to socket . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:51 - OpenVPN > delete net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:51 - OpenVPN > delete net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:51 - OpenVPN > delete net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:51 - Connection terminated. I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (FT232R USB UART) . 2016.06.08 12:41:51 - OpenVPN > Closing TUN/TAP interface . 2016.06.08 12:41:51 - OpenVPN > SIGTERM[hard,] received, process exiting I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Ethernet) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Ethernet Adaptor (en4)) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (iPhone USB) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (FireWire) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2016.06.08 12:41:54 - Checking authorization ... ! 2016.06.08 12:41:55 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: stunnel 5.17 on x86_64-apple-darwin14.3.0 platform . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Threading:PTHREAD Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Reading configuration from file /Users/Cameron/.airvpn/076998ce2835bcd7f333f7ce592ff251783a4d0dccdd75463117af3565c0f2d2.tmp.ssl . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: UTF-8 byte order mark not detected . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[ui]: Initializing service [openvpn] . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Configuration successful . 2016.06.08 12:41:55 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50670 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: Failover strategy: round-robin . 2016.06.08 12:41:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: s_connect: connecting 213.152.162.100:443 . 2016.06.08 12:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.08 12:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.08 12:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:55 - OpenVPN > Socket Buffers: R=[131072->131072] S=[131072->131072] . 2016.06.08 12:41:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:42680 [nonblock] . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: s_connect: connected 213.152.162.100:443 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.12:50671 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: SNI: sending servername: 213.152.162.100 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: CERT: Locally installed certificate matched . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: SSL connected: new session negotiated . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2016.06.08 12:41:56 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:56 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.06.08 12:41:56 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:56 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:42680, sid=e868f59a 41de3c84 . 2016.06.08 12:41:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.08 12:41:56 - OpenVPN > Validating certificate key usage . 2016.06.08 12:41:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.08 12:41:56 - OpenVPN > VERIFY KU OK . 2016.06.08 12:41:56 - OpenVPN > Validating certificate extended key usage . 2016.06.08 12:41:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.08 12:41:56 - OpenVPN > VERIFY EKU OK . 2016.06.08 12:41:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.08 12:41:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.08 12:41:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.08 12:41:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.89 255.255.0.0' . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.08 12:41:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.08 12:41:59 - OpenVPN > Opened utun device utun0 . 2016.06.08 12:41:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.08 12:41:59 - OpenVPN > /sbin/ifconfig utun0 delete . 2016.06.08 12:41:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2016.06.08 12:41:59 - OpenVPN > /sbin/ifconfig utun0 10.50.6.89 10.50.6.89 netmask 255.255.0.0 mtu 1500 up . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.6.89 255.255.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 10.50.0.0: gateway 10.50.6.89 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:59 - OpenVPN > add net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:59 - OpenVPN > add net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:59 - Starting Management Interface . 2016.06.08 12:41:59 - OpenVPN > Initialization Sequence Completed I 2016.06.08 12:41:59 - DNS of a network adapter forced (FT232R USB UART) I 2016.06.08 12:41:59 - DNS of a network adapter forced (Ethernet) I 2016.06.08 12:41:59 - DNS of a network adapter forced (Ethernet Adaptor (en4)) . 2016.06.08 12:41:59 - Unknown networksetup output: '' for interface 'Wi-Fi' I 2016.06.08 12:41:59 - DNS of a network adapter forced (iPhone USB) I 2016.06.08 12:42:00 - DNS of a network adapter forced (Bluetooth PAN) I 2016.06.08 12:42:00 - DNS of a network adapter forced (FireWire) I 2016.06.08 12:42:00 - DNS of a network adapter forced (Thunderbolt Bridge) I 2016.06.08 12:42:00 - Flushing DNS I 2016.06.08 12:42:00 - Checking route I 2016.06.08 12:42:00 - Checking DNS E 2016.06.08 12:42:00 - DNS checking failed. . 2016.06.08 12:42:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.08 12:42:00 - Disconnecting . 2016.06.08 12:42:00 - Management - Send 'signal SIGTERM' . 2016.06.08 12:42:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.08 12:42:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG6[0]: Read socket closed (readsocket) . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG6[0]: SSL_shutdown successfully sent close_notify alert . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing . 2016.06.08 12:42:01 - OpenVPN > delete net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG5[0]: Connection closed: 9970 byte(s) sent to SSL, 10271 byte(s) sent to socket . 2016.06.08 12:42:01 - OpenVPN > delete net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:42:01 - OpenVPN > delete net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:42:01 - OpenVPN > delete net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:42:01 - OpenVPN > Closing TUN/TAP interface . 2016.06.08 12:42:01 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.06.08 12:42:01 - Connection terminated. I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (FT232R USB UART) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Ethernet) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Ethernet Adaptor (en4)) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (iPhone USB) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (FireWire) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2016.06.08 12:42:02 - Cancel requested. I 2016.06.08 12:42:02 - IPv6 restored on network adapter (FT232R USB UART) I 2016.06.08 12:42:02 - IPv6 restored on network adapter (Ethernet) I 2016.06.08 12:42:02 - IPv6 restored on network adapter (Ethernet Adaptor (en4)) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Wi-Fi) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (iPhone USB) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Bluetooth PAN) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (FireWire) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Thunderbolt Bridge) ! 2016.06.08 12:42:03 - Session terminated.
  4. Using AirVPN on ASUS AC87U. Every few hours/days (randomly) Internet connection goes off because of "openvpn[11287]: RESOLVE: Cannot resolve host address: europe.vpn.airdns.org: Name or service not known" error. The only way to fix it - disable and enable VPN client again. Once done, it starts working the same second. If I don't re-enable VPN, the error continues forever (waited 3 days once to see if it somehow starts working again). I'm using custom DNS 10.4.0.1 and 217.12.210.54. After search on this forum, I found some type of "fix", but it's not useful anymore because AirVPN config generator doesn't include "All servers for area or region" option anymore ( https://airvpn.org/topic/9898-problem-connection-while-using-10401-and-10501-dns-entries/?do=findComment&comment=11947 ). What are my options?
  5. Hi, I recently bought an Asus RT-AC66 and install Tomato Shibby on it. I currently have a wrt54g with Tomato Toastman and it is configure as per instruction provided on here and it works well However on the Asus, it works first time and then it stops. On connection to the VPN, i get internet briefly. Then nothing. On my browser (chrome), it says DNS_PROBE BAD_CONFIG. I have been trying all sort for the last 2 days. I hope someone can help me with this. Thanks.
  6. When VPN connected from San Francisco area via Comcast ISP to Germany IPLeak.net in Chrome browser shows the following: IP 213.152.162.84 WebRTC 213.152.162.84 DNS Addr Det. US 162.242.211.137 Germany 78.46.223.24 I was surprised to see a US DNS address. With NSLookup 162.242.211.137 showed as a non-existent domain trying to resolve with OpenDNS in my home NAT router. But I can ping that IP address. In the Chrome browser I am using the WebRTC Leak Prevent addon. I think WebRTC is ok since it only shows my IP address in Germany.
  7. I've recently started using AirVPN. I am connecting to AirVPN with a pfSense router (v2.3 using the DNS resolver). The problem I'm having is an intermittent failure to resolve www.airvpn.org from any device on the network. airvpn.org seems to be the only site impacted. When I try to go to the AirVPN site it will timeout. If I wait a minute or so, I am able to successfully load the AirVPN site. The next time I tried to go to the site, it times out again....wait a minute than I can get in again. This occurs over and over again. When the site won't load, nslookup fails, but a DNS query from the pfSense box succeeds, showing a response from the AirVPN DNS server. My pfSense is setup with two VLANS - one VLAN directing traffic to AirVPN and another VLAN that routes traffic out the standard WAN port (using OpenDNS DNS servers). This problem only happens on the VPN VLAN, using the other (non-VPN) VLAN works correctly. All of this makes me think the problem is somewhere in the pfSense configuration, but the fact that it only impacts airvpn.org when using the AirVPN DNS server makes me think I should start here. I've tried several different servers (Metallah, Rasalas, Pollux, Azha, Acamar, Zosma) with no change in the issue. If I try to go to the site using the IP address returned by nslookup I get a browser warning "Your connection is not secure". To connect I have to create a security exception in the browser. I don't get this error when I am able to browse the site using the name instead of the IP. If it matters, I'm using pfBlockerNG on the pfSense box, but I have this problem even when pfBlockerNG is disabled or even uninstalled. Has anyone ever seen this behavior or have any ideas how to resolve it?
  8. hi whenever i tried to access bbc iplayer it detects DNS and prohibit the access .can anyone explain
  9. Hi, My internet does not work when I log off or turn off AirVPN. The reason for this is the DNS settings don't get reset to automatic. Every time I log off, I have to go to IPV4 settings, and change the DNS settings to automatic from the address inserted by AirVPN. This is happening on both my Windows 10 laptop / Windows 8.1 Desktop. Strangely, its 100% of the time on laptop and periodically on my desktop. I have "Network Lock" mode set to none. Also turned off his Activate Network Lock at Startup, and the DNS Switch Mode set to automatic. Any help?
  10. Hello, it seems there might be a DNS issue on the new Atria server. Can someone verify this?
  11. I recently updated the AirVPN client due to incompatibility with a windows 10 update and am now caught in a 'Checking DNS' loop. I have tried checking firewall, restarted DHCP client and resetting WINSOCK as instructed but no success. Has anyone had a similar issue that they resolved? Thanks logs are as follows: I 2016.04.22 07:44:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.22 07:44:27 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml . 2016.04.22 07:44:28 - Data Path: C:\Users\user\AppData\Local\AirVPN . 2016.04.22 07:44:28 - App Path: C:\Program Files\AirVPN . 2016.04.22 07:44:28 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.22 07:44:28 - Command line arguments (1): path="home" . 2016.04.22 07:44:28 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.22 07:44:28 - Updating systems & servers data ... I 2016.04.22 07:44:30 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.04.22 07:44:30 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.22 07:44:30 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.22 07:44:30 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.04.22 07:44:30 - Activation of Network Lock - Windows Firewall . 2016.04.22 07:44:31 - Systems & servers data update completed ! 2016.04.22 07:44:34 - Ready I 2016.04.22 07:44:42 - Checking login ... ! 2016.04.22 07:44:43 - Logged in. I 2016.04.22 07:44:45 - Session starting. I 2016.04.22 07:44:45 - IPv6 disabled. I 2016.04.22 07:44:47 - Checking authorization ... ! 2016.04.22 07:44:48 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:44:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:44:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:44:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:44:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:44:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:49 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=244fb12e d44b9f1a . 2016.04.22 07:44:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:44:50 - OpenVPN > Validating certificate key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:44:50 - OpenVPN > VERIFY KU OK . 2016.04.22 07:44:50 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:44:50 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:44:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:44:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:44:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:44:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:44:56 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:44:56 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:44:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:44:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:44:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:44:56 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:45:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - Starting Management Interface . 2016.04.22 07:45:02 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:45:02 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:45:02 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:45:02 - Flushing DNS I 2016.04.22 07:45:03 - Checking DNS W 2016.04.22 07:46:07 - The operation has timed out ! 2016.04.22 07:46:07 - Disconnecting . 2016.04.22 07:46:07 - Management - Send 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:46:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:46:07 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:46:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:46:13 - Connection terminated. I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:16 - Checking authorization ... ! 2016.04.22 07:46:17 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:46:17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:46:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:46:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:46:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=31b5a96e f1c388b8 . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:46:21 - OpenVPN > Validating certificate key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:46:21 - OpenVPN > VERIFY KU OK . 2016.04.22 07:46:21 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:46:21 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:46:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:46:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:46:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:46:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:46:36 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:46:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:46:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:46:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:46:36 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:46:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - Starting Management Interface . 2016.04.22 07:46:41 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:46:41 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:46:41 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:41 - Flushing DNS I 2016.04.22 07:46:41 - Checking DNS W 2016.04.22 07:47:44 - The operation has timed out ! 2016.04.22 07:47:45 - Disconnecting . 2016.04.22 07:47:45 - Management - Send 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:47:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:47:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:47:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:47:51 - Connection terminated. I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:47:54 - Checking authorization ... ! 2016.04.22 07:47:55 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:47:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:47:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:47:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:47:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:47:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:47:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=9735c095 a359c91b . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:47:56 - OpenVPN > Validating certificate key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:47:56 - OpenVPN > VERIFY KU OK . 2016.04.22 07:47:56 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:47:56 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:48:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:48:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:48:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:48:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:48:04 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:48:04 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:48:04 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:48:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:48:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:48:04 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:48:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - Starting Management Interface . 2016.04.22 07:48:10 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:48:10 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:48:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:48:10 - Flushing DNS I 2016.04.22 07:48:10 - Checking DNS W 2016.04.22 07:49:13 - The operation has timed out ! 2016.04.22 07:49:14 - Disconnecting . 2016.04.22 07:49:14 - Management - Send 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:49:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:49:14 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:49:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:49:19 - Connection terminated. I 2016.04.22 07:49:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:49:20 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:23 - Checking authorization ... ! 2016.04.22 07:49:24 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:49:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:49:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:49:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:49:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:49:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:25 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=4be6c1cd e79de183 . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:49:25 - OpenVPN > Validating certificate key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:49:25 - OpenVPN > VERIFY KU OK . 2016.04.22 07:49:25 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:49:25 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:49:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:49:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:49:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:49:29 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:49:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:49:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:49:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:49:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:49:30 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:49:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - Starting Management Interface . 2016.04.22 07:49:35 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:49:36 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:49:36 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:36 - Flushing DNS I 2016.04.22 07:49:36 - Checking DNS W 2016.04.22 07:50:41 - The operation has timed out ! 2016.04.22 07:50:41 - Disconnecting . 2016.04.22 07:50:41 - Management - Send 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:50:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:50:41 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:50:47 - Connection terminated. I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:50:50 - Checking authorization ... ! 2016.04.22 07:50:51 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:50:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:50:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:50:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:50:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:50:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:50:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=493fb40b 5f7da64a . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:50:52 - OpenVPN > Validating certificate key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:50:52 - OpenVPN > VERIFY KU OK . 2016.04.22 07:50:52 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:50:52 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:50:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:51:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:51:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:51:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:51:02 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:51:02 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:51:02 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:51:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:51:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:51:02 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:51:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - Starting Management Interface . 2016.04.22 07:51:07 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:51:07 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:51:07 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:51:07 - Flushing DNS I 2016.04.22 07:51:07 - Checking DNS W 2016.04.22 07:52:11 - The operation has timed out ! 2016.04.22 07:52:11 - Disconnecting . 2016.04.22 07:52:11 - Management - Send 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:52:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:52:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:52:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:52:17 - Connection terminated. I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:20 - Checking authorization ... ! 2016.04.22 07:52:21 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:52:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:52:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:52:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:52:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:52:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=7d716aea b0e65614 . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:52:22 - OpenVPN > Validating certificate key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:52:22 - OpenVPN > VERIFY KU OK . 2016.04.22 07:52:22 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:52:22 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:52:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:52:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:52:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:52:27 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:52:27 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:52:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:52:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:52:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:52:27 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:52:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - Starting Management Interface . 2016.04.22 07:52:32 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:52:32 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:52:32 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:32 - Flushing DNS I 2016.04.22 07:52:33 - Checking DNS W 2016.04.22 07:53:36 - The operation has timed out ! 2016.04.22 07:53:36 - Disconnecting . 2016.04.22 07:53:36 - Management - Send 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:53:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:53:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:53:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:53:41 - Connection terminated. I 2016.04.22 07:53:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:53:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:53:46 - Checking authorization ... ! 2016.04.22 07:53:47 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:53:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:53:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:53:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:53:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:53:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:48 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=10161db4 82e9b416 . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:53:48 - OpenVPN > Validating certificate key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:53:48 - OpenVPN > VERIFY KU OK . 2016.04.22 07:53:48 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:53:48 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:53:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:53:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:53:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:53:58 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:53:58 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:53:58 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:53:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:53:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:53:58 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:54:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - Starting Management Interface . 2016.04.22 07:54:03 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:54:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:54:03 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:54:03 - Flushing DNS I 2016.04.22 07:54:03 - Checking DNS W 2016.04.22 07:55:07 - The operation has timed out ! 2016.04.22 07:55:08 - Disconnecting . 2016.04.22 07:55:08 - Management - Send 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:55:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:55:13 - Connection terminated. I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:17 - Checking authorization ... ! 2016.04.22 07:55:18 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:55:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:55:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:55:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:55:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:55:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:18 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=036bc46f f31831eb . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:55:19 - OpenVPN > Validating certificate key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:55:19 - OpenVPN > VERIFY KU OK . 2016.04.22 07:55:19 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:55:19 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:55:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:55:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:55:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:55:23 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:55:23 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:55:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:55:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:55:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:55:23 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:55:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - Starting Management Interface . 2016.04.22 07:55:28 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:55:28 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:55:28 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:28 - Flushing DNS I 2016.04.22 07:55:28 - Checking DNS W 2016.04.22 07:56:31 - The operation has timed out ! 2016.04.22 07:56:31 - Disconnecting . 2016.04.22 07:56:31 - Management - Send 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:56:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:56:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:56:36 - Connection terminated. I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:56:36 - Cancel requested. I 2016.04.22 07:56:36 - IPv6 restored. ! 2016.04.22 07:56:37 - Session terminated. ! 2016.04.22 07:56:39 - Deactivation of Network Lock
  12. Once you have your vpn setup and want to check and verify how well it is working what is the best site to visit to verify no dns leak and the ip address?
  13. Greetings - I am having slow page loads for Https, placing an Amazon order and various user forums. Http is working just fine. Setup: Macintosh OS X, El Capitan, Google Chrome browser, Eddie v 2.10; SSL Tunnel port 443 I have read issues with Safari DNS prefetch and switched to Chrome to test. Only extensions are Adblock Plus and Disconnect. DNS is confirmed at 10.50.0.1 (AirVPN). Various speed tests confirm that things are humming along. I have also tired various MTU settings on my router from 1500 down and nothing seems to help. This issue is even more noticeable on an iPad running OpenVPN UDP, 443. Chrome or Safari. Any ideas to try next? Thanks.
  14. I'm trying to use my preferred DNS server (from OpenDNS) rather than the recommended AirVPN server. I've tried listing the IP addresses under Preferences -> Advanced -> DNS, with DNS Switch mode Disabled or Automatic and with "Check if the tunnel uses AirVPN DNS" selected or deselected. In every case, a connection is established, then immediately disconnected, after which the sequence repeats. How can I successfully use a non-AirVPN DNS server?
  15. I am having a bit of trouble editing the resolv.conf file. Aparently, I cant edit it manually as suggested on the Arch wiki. "To use alternative DNS servers, edit /etc/resolv.conf and add them to the top of the file so they are used first, optionally removing or commenting out already listed servers." https://wiki.archlinux.org/index.php/Resolv.conf Although I can open the file and edit it, I can't save the nameservers I entered. (I am as admin with root privileges.) I thought maybe it was being run by another process so I tried lsattr and nothing was holding it. I even ran chattr -i /etc/resolv.conf just to make sure. Still no avail.
  16. I had problems with my ISP:s DNS servers showing up on DNS leak tests. It seems that this is a Windows 10 related problem and is fixed in OpenVPN 2.3.9 when using the --block-outside-dns configuration option. I managed to fix leaks by switching to OpenVPN-GUI-client and adding block-outside-dns to the AirVPN configuration file. It might also be possible to use the plugin in Eddie's OpenVPN-version. I haven't tested this because I'm happy with the OpenVPN-GUI for now. The plugin can be found from here: https://github.com/ValdikSS/openvpn-fix-dns-leak-plugin Hopefully this is helpful for someone.
  17. Yesterday I was running airvpn over tor with socks5 (vip72). I had no issues, iplocation.net had my location pinned as the location of my socks5 proxy. But today I am running the same setup but iplocation.net still has my location pinned as the location of the airvpn server. ( we'll say airvpn server is somewhere in WA, and socks5 is somewhere in Texas) The only change I have made since yesterday is that I switched my DNS servers to Comodo rather than my ISP. Would this be enough to change the differing results?
  18. Good morning, For starters, I'll say that I am new to your VPN, this is actually my very first paid VPN, and although I have done a lot of research and understand the entire concept there are still a few sticking points that confuse me. With that said, I have really enjoyed the service you provide and the extensive effort your team puts into keeping our internet privacy top priority. Seriously, well done. So up until now, I have not had any issues connecting. I was able to get up and running with no problem and have stayed connected when I've needed to be connected. I woke up this morning and was off the network and Eddie seemed to be frozen. I had to do a force quit and when I restarted it, every time I try to reconnect It stalls on checking route and then disconnects and I can't get on any of the servers. I have OSX with latest OS and latest Eddie. Additionally I'd like to get a bit of help explaining to me DNS and proxy once I get my issue resolved. I understand some of it but I just need a clearer explanation of how I can implement even tighter security using DNS tunneling, port forwarding and proxies. Things I would like to achieve: I'd like to ultimately connect to TOR through the VPN in the most effective way.I'd like to understand the advantages of DNS, tunneling and port forwarding so I can take advantage of its uses.If you could tell me if having OSX, if Eddie is still the better option or should I connect using my own VPN options through my OSI'd like to set up my own personal VPN through my OS so that I can be connected to my Windows Laptop when I need toand could you tell me if with service if we have use of private proxies or does the fact I am on a VPN do a way of needing to use a proxy?Thanks in advance for anything you can help me with and best regards LB
  19. I'm having a rather strange issue. I can connect to AirVPN and surf most sites without issue, but for some reason verizonwireless.com is a complete black hole. During troubleshooting I opened a command prompt and performed an nslookup against the VPN tunnel supplied DNS servers for things like Google without issue. But when I try the same command for verizonwireless.com I get nothing back. Likewise, I can get to the main Verizon website, but when I click on the "Wireless" section it dies again. Very strange. Any known issues at the moment that would explain this?
  20. Hello. I am having a problem connecting to any VPN server. It does not matter my distance from the server. When ever I attempt to connect. I get a "DNS Check Failed" and I get disconnected. Are you guys aware of this issue or do you know a way to fix it?
  21. The resolv-conf-update script uses bash-specific variable substitutions so won't work on my dd-wrt router, firmware v3.0-r28112 so, having followed the Air setup guide, I've made the following changes to action the pushed dns value. - remove the static dns entry for 10.x.0.1 from the Basic setup page. I do have an OpenNIC static dns ip there too. - added the following script to the Admin,Commands,Startup to edit the resolver config file # Ensure client enabled [ `nvram get openvpncl_enable` ] || exit OVPN='/tmp/openvpncl' DNSMQ='/tmp/dnsmasq.conf' echo "#!/bin/sh # Fetch dnsmasq's 'resolv.conf' RSLV=\`sed '/resolv-file/!d ; s/.*=//' $DNSMQ\` # Edit resolver conf - (only works for single pushed dns server) case \$script_type in up) # Get pushed dns from env PDNS=\`set | sed '/foreign_option_.*dhcp-option DNS /!d ; s/.* \([0-9.]*\).*/nameserver \1/'\` sed -i \"1s/^/\$PDNS\n/\" \$RSLV echo \$PDNS >$OVPN/pdns ;; down) PDNS=\`set | cat $OVPN/pdns\` sed -i \"/\$PDNS/d\" \$RSLV ;; esac " > $OVPN/updown.sh # Hack redundant, problem rules sed -i 's/\(.*-I INPUT\)\(.*j \).*/\1 2 \2REJECT/' $OVPN/route-*.sh sed -i 's/\(.*-D INPUT\)\(.*j \).*/\1 \2REJECT/' $OVPN/route-*.sh sed -i '/FORWARD/d' $OVPN/route-*.sh chmod 600 $OVPN/* chmod 700 $OVPN/*.sh killall openvpn ; openvpn --config /tmp/openvpncl/openvpn.conf --route-up /tmp/openvpncl/route-up.sh --down-pre /tmp/openvpncl/route-down.sh --daemon ​ ​ ​ dnsmasq polls its resolver file, resolv.dnsmasq, and acts on changes, so doesn't require any explicit update instructions. ​Note: **added** openvpn restart - there's currently a timing issue (updown.sh isn't created until after the initial start of openvpn, which consequently fails) - add the following directives to the openvpn config up /tmp/openvpncl/updown.sh down /tmp/openvpncl/updown.sh - check it works by visiting ipleak.net or look at /tmp/resolv.dnsmasq on the dd-wrt
  22. Hi, I have some troubles with my internet connection while disconnected from the VPN. As soon as I disconnect from the VPN, every access to any URL gives an adress naming error after a quite long time out. Windows connectivity diagnosis reports a problem with DNS server. Network lock is not activated, I'm using this VPN for one month without problem up to now. I restarted/reseted the box, disabled temporarilly the firewall, no success. I can only access internet from the VPN. There has been no update of any software from the working to not working state. Is there anybody that could drive me to do some test to try to locate where the problem comes from ? Thanks for your help. Laurent
  23. Hi I have read these links and typically, even if I have closed Airvpn and don't have network lock enabled, it still leaves manually assigned DNS entry that then doesn't allow me to browse. Is anyone working to fix this, so that Airvpn is closed, it puts your DNS back to defaults of auto assigned? Thanks
  24. I've been noticing the for last week or so that no matter what server I'm connected to after a little while (say, ~15 minutes sometimes more sometimes less) website look ups will stop working completely. I have changed DNS servers as a test which made no difference. I've tried different browsers and they react the same way - like they're not connected at all. I've even watched the traffic with wireshark and haven't noticed anything unusual (DNS traffic goes out and comes back but browsers still act like they have no connection and it's only web browsers). Changing to another server always fixes the issue but then it comes back again. Outside of the tunnel my connectivity is unaffected. No idea what the problem could be. Is this happening to anyone else?
  25. Hello, I am having trouble connecting to any of my internal computers/servers while connected to AirVPN. All of my requests to my internal FQDN addresses are getting timed out, but connections using plain IP addresses are working fine. Issue is probably with DNS request. I have added my internal IP network ranges to the Routes table in Preferences but attempting to add Routes by hostname or FQDN doesn't work, cannot save my input. How can I configure the AirVPN client to allow me access to my internal computers ? Thank you.
×
×
  • Create New...