Jump to content
Not connected, Your IP: 54.158.251.104

Search the Community

Showing results for tags 'DNS'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 182 results

  1. Here: https://airvpn.org/specs/ is stated that each AirVPN server has its own DNS server. Why is that? Why are the DNS servers protocol and port specific? Why not give just one? Is that arbitrary or does it serve a purpose besides load balancing? What will happen if I use for example UDP Port 53 for my VPN connection and 10.9.0.1 as my DNS server instead of the listed 10.8.0.1?
  2. I can not go to many sites
  3. So I've just installed the AirVPN client and got it to work without any troubles, every setting is set on default. But sadly after running a test on doileak.com (can't connect to doileak.net ??) I see instances of DNS requests originating from my ips. I use Firefox which according to the test is not suffering from an WebRTC IP Leak. When checking the ethernet connections like the TAP-Windows Adapter V9 IPV4 settings I do see its working with a preferred DNS server adress. Changing this to obtaining a DNS server address automatically did not solve the issue. Neither after a pc restart. I have no idea how to solve this. (ps. I confused doileak.com with ipleak.net, so yeah of course I cannot connect to doileak.net )
  4. Booted my machine today and can no longer connect to the internet unless I connect to AirVPN first. Seems to be a DNS error but I can't for the life of me figure out what the problem is or how to revert to yesterday.
  5. at http://reg.for.free you can set up your own free domain which anyone can surf to who uses a proper nameserver (dns) such as those listed here: https://www.opennicproject.org AirVPN has those DNS built-in right from the start. It usually easy to setup an openNIC nameserver in nm-applet in Linux via GUI (just add the address 5.135.183.146 ).
  6. re-edit: AirVPN ALREADY does support openNIC top level domains such as .bit .fur .free .pirate asf. ! Would it not be cool to support domains out of ICANN ? http://wiki.opennicproject.org/OpenNICNamespaces Anyone can register their webservers free of charge! If Air supported that right out of the box, it would be some nice added value! Or does it introduce new problems?
  7. Hi, I just bought a subscription to airvpn but unfortunately I can't connect to internet I am on Ubuntu 16.04.1. My attempts : - I tried with the terminal. here is the log : pc@computer:~/DL$ openvpn AirVPN_BE-Brussels_Diadema_UDP-443.ovpn Fri Dec 30 23:50:51 2016 OpenVPN 2.3.10 i686-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Fri Dec 30 23:50:51 2016 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 Fri Dec 30 23:50:51 2016 Control Channel Authentication: tls-auth using INLINE static key file Fri Dec 30 23:50:51 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Dec 30 23:50:51 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Dec 30 23:50:51 2016 Socket Buffers: R=[163840->163840] S=[163840->163840] Fri Dec 30 23:50:51 2016 UDPv4 link local: [undef] Fri Dec 30 23:50:51 2016 UDPv4 link remote: [AF_INET]194.187.251.162:443 Fri Dec 30 23:50:51 2016 TLS: Initial packet from [AF_INET]194.187.251.162:443, sid=f969fb38 f697c7be Fri Dec 30 23:50:51 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Fri Dec 30 23:50:51 2016 Validating certificate key usage Fri Dec 30 23:50:51 2016 ++ Certificate has key usage 00a0, expects 00a0 Fri Dec 30 23:50:51 2016 VERIFY KU OK Fri Dec 30 23:50:51 2016 Validating certificate extended key usage Fri Dec 30 23:50:51 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Dec 30 23:50:51 2016 VERIFY EKU OK Fri Dec 30 23:50:51 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Fri Dec 30 23:50:52 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Dec 30 23:50:52 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Dec 30 23:50:52 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Dec 30 23:50:52 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Dec 30 23:50:52 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Fri Dec 30 23:50:52 2016 [server] Peer Connection Initiated with [AF_INET]194.187.251.162:443 Fri Dec 30 23:50:54 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Fri Dec 30 23:50:54 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.248 255.255.0.0' Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: timers and/or timeouts modified Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: LZO parms modified Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: --ifconfig/up options modified Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: route options modified Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: route-related options modified Fri Dec 30 23:50:54 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Fri Dec 30 23:50:54 2016 ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=wlp6s0 HWADDR=xx:xx:xx:xx:xx:xx Fri Dec 30 23:50:54 2016 ERROR: Cannot ioctl TUNSETIFF tun: Operation not permitted (errno=1) Fri Dec 30 23:50:54 2016 Exiting due to fatal error - I tried with the client. The .ded (stable AND experimental) didn't want to install on the system. - I tried with portable client (stable AND experimental) but when I launch "airvpn" nothing happens. - I tried with the network-manager. Importing the config file was a success and I passed to connect to the VPN ..... Yes, but all websites are unreachable (DNS issue because I can ping a specific IP) : # I wrote in the settings in the networkmanager the dns server (10.4.0.1). Same issue : DNS does not work. # I changed the nameserver in the resolv.conf .... but same thing the DNS doe not do the job. So i need help. What can I do now ? Thanks A new member a bit confused
  8. Like some others here, I too have an issue on Windows where after "Checking route", the vpn client throws out the error from the title and doesn't connect to a server. I've played around with different settings while reading logs trying to see what causes it and it seems that for some reason either Windows or the vpn client dislike when both your default (ISP) network connection and the TAP (VPN) network connection have the same DNS settings. Fortunately, there's an easy workaround: 1) Make sure your default network connection's DNS are not one of AirVPN DNS servers (i.e. not 10.4.0.1). It can be either automatic or some of your other favorite DNS servers. 2) Check that the TAP network connection is set to automatic DNS servers (don't put any in manually). 3) In the 2.11 beta vpn client (I haven't tested on 2.10 stable) open Preferences (and click on "Reset to default settings" just in case) -> Advanced -> and then uncheck "Force all network interfaces for DNS". After that open the DNS settings tab just to make sure everything in there is set to default values (DNS Switch mode - Automatic, Check AirVPN DNS - yes, DNS Servers - blank). That's it. Now, there's one thing I'd like to mention. When doing all this I was worried that I would have a DNS leak because when I was using a different VPN service it would occasionally leak the DNS set in my default network connection's settings. However I've tested it out and there's no leak, and if you want to test it out for yourself I suggest using both ipleak and doileak, and for best results make sure you disconnect and reconnect several times to the same server and a few other servers in between tests, just to cover a wider ground. Feel free to ask questions or leave comments. P.S. As a general tip - I recommend you don't use your ISP's DNS settings for your default connection (unless you have to) cause there are some great uncensored and faster DNS servers out there. And as for the VPN DNS server I recommend you do stick with default AirVPN DNS servers cause it's useful having your IP and DNS address be the same.
  9. I haven't got internet connection from my real IP when I disconnect in the client. When I connect to a VPN server, everything is fine, just sometimes I have DNS errors in the browser for seconds when I'm browsing. I've been struggling with this issue about a week. I didn't change anything before the problem occured. I updated the client software now, but everything is the same. I don't know what to do. I would like to set up everything to default, but I don't know what was changed in the settings by the client. I don't want to reinstall the Windows 7, probably this would solve the problem, but if the client changed some settings, maybe it could occur again when I reinstall it. Sometimes I use the internet without VPN, so I need to solve it. Can you help me with this?
  10. ​Hi everyone, Signed up a couple of weeks ago and from the start I've been experiencing very slow DNS lookup. That is to say, webpages will pause on 'looking up example.com...' for 5-10 seconds. ​So far I have tried: adjusted buffers, changed MTU, rolled back TAP driver, experimental Eddie, disabled IPv6. Have tried multiple servers and different browsers with same results. Actual speeds are reasonable enough. Don't see anything untoward in the logs. ​I'm running experimental Eddie client on Windows 10. Router is ASUS RT-AC66U with Merlin firmware. ​Any suggestions? Thanks all.x
  11. Hello, I've been reading through all the DNS posts I can find, and I've tried a few things, but I seem to be having a persistant issue. I've used AirVPN for a good long while without issues at all. I've just moved to NZ and am now using a Fibre provider for my internet. Everything is fine, until I connect to a AirVPN Server, and then after about 30 seconds I cannot browse the web. I've upgraded to the latest Eddie client (I'm on Win10 x64), and I've tried the Experimental version too. I get the same issue with both. After a while (over 10 mins) the DNS may resolve and the website will load, or I can manually restart the dnscache service and i can immediately (for about a minute) resolve a web address. The only site I can always get is airvpn sites. Here's my airvpn logs I 2016.12.10 21:26:02 - Session starting. . 2016.12.10 21:26:05 - Shell of 'cmd.exe','/c net stop dnscache' done sync in 3078 ms . 2016.12.10 21:26:08 - Shell of 'cmd.exe','/c net start dnscache' done sync in 2610 ms . 2016.12.10 21:26:08 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 406 ms . 2016.12.10 21:26:12 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 3406 ms . 2016.12.10 21:26:12 - IPv6 disabled with packet filtering. I 2016.12.10 21:26:12 - Checking authorization ... ! 2016.12.10 21:26:13 - Connecting to Alkes (United States, Los Angeles) . 2016.12.10 21:26:13 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016 . 2016.12.10 21:26:13 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.12.10 21:26:13 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 . 2016.12.10 21:26:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.12.10 21:26:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.12.10 21:26:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.12.10 21:26:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.12.10 21:26:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.12.10 21:26:13 - OpenVPN > UDPv4 link local: [undef] . 2016.12.10 21:26:13 - OpenVPN > UDPv4 link remote: [AF_INET]199.241.146.180:80 . 2016.12.10 21:26:13 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.180:80, sid=56746947 3f1dbee8 . 2016.12.10 21:26:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.12.10 21:26:13 - OpenVPN > Validating certificate key usage . 2016.12.10 21:26:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.12.10 21:26:13 - OpenVPN > VERIFY KU OK . 2016.12.10 21:26:13 - OpenVPN > Validating certificate extended key usage . 2016.12.10 21:26:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.12.10 21:26:13 - OpenVPN > VERIFY EKU OK . 2016.12.10 21:26:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.12.10 21:26:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.12.10 21:26:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.12.10 21:26:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.12.10 21:26:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.12.10 21:26:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.12.10 21:26:14 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.180:80 . 2016.12.10 21:26:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.12.10 21:26:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.250 255.255.0.0' . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.12.10 21:26:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.12.10 21:26:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=7 HWADDR=8c:89:a5:2a:25:bf . 2016.12.10 21:26:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.12.10 21:26:16 - OpenVPN > open_tun, tt->ipv6=0 . 2016.12.10 21:26:16 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4DF667A8-313D-4C55-9802-FEABD12F2883}.tap . 2016.12.10 21:26:16 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.12.10 21:26:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.250/255.255.0.0 [sUCCEEDED] . 2016.12.10 21:26:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.250/255.255.0.0 on interface {4DF667A8-313D-4C55-9802-FEABD12F2883} [DHCP-serv: 10.6.255.254, lease-time: 31536000] . 2016.12.10 21:26:16 - OpenVPN > Successful ARP Flush on interface [6] {4DF667A8-313D-4C55-9802-FEABD12F2883} . 2016.12.10 21:26:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.12.10 21:26:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.241.146.180 MASK 255.255.255.255 192.168.1.1 . 2016.12.10 21:26:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=15 and dwForwardType=4 . 2016.12.10 21:26:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.12.10 21:26:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1 . 2016.12.10 21:26:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=15 and dwForwardType=4 . 2016.12.10 21:26:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.12.10 21:26:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1 . 2016.12.10 21:26:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=15 and dwForwardType=4 . 2016.12.10 21:26:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.12.10 21:26:21 - Starting Management Interface . 2016.12.10 21:26:21 - OpenVPN > Initialization Sequence Completed . 2016.12.10 21:26:21 - DNS leak protection with packet filtering enabled. . 2016.12.10 21:26:21 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller, from manual (192.168.1.1) to 10.6.0.1) I 2016.12.10 21:26:21 - Flushing DNS . 2016.12.10 21:26:24 - Shell of 'cmd.exe','/c net stop dnscache' done sync in 3203 ms . 2016.12.10 21:26:25 - Shell of 'cmd.exe','/c net start dnscache' done sync in 610 ms . 2016.12.10 21:26:25 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 421 ms . 2016.12.10 21:26:29 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 3438 ms I 2016.12.10 21:26:29 - Checking route I 2016.12.10 21:26:54 - Checking DNS ! 2016.12.10 21:26:55 - Connected. . 2016.12.10 21:26:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.12.10 21:26:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info As can be seen, I use the default DNS servers for airvpn, and I've previously tested them against ipleak.net and they've been good, with no leakage. I've disabled IPV6 on both the adapters and in the registry, and I've previously tried setting OpenDNS servers instead of air's. I have another device in the house that doesn't use AirVPN and that is fine (as is this machine when not connected to Air). I do use Comodo Internet Security with rules for AirVPN, but they've not changed settings for over a year (then again, I hadn't changed Air either until I started getting these issues), I did wonder if the Fibre provider was causing an issue as I've only ever had copper-wired internet before? I'm also hard wired to the route, not that that is going to make a difference. Could there be a very low tolerance for DNS lookups between Air servers and NZ? I find I connect to the US servers with about 2.5 stars latency (126ms). After typing all this up, my DNS now resolves temporarily, and this was my ping response to google.co.uk Pinging www.google.co.uk [74.125.68.94] with 32 bytes of data:Reply from 74.125.68.94: bytes=32 time=306ms TTL=43Reply from 74.125.68.94: bytes=32 time=307ms TTL=43Reply from 74.125.68.94: bytes=32 time=306ms TTL=43 Ping statistics for 74.125.68.94: Packets: Sent = 3, Received = 3, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 306ms, Maximum = 307ms, Average = 306ms Any ideas are much appreciated as I'm going nuts constantly restarting my dnscache service.
  12. Just installed the most recent Windows 10 update, been looking around the site but haven't found a definitive solution. I keep disconnecting as it is checking the route, I've tried unchecking "Check if the tunnel uses AirVPN DNS", but that results in a faulty connection. Logs: I 2016.12.06 23:38:00 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.12.06 23:38:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.12.06 23:38:00 - Data Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - App Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.12.06 23:38:00 - Command line arguments (0):. 2016.12.06 23:38:00 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.12.06 23:38:00 - Updating systems & servers data ...I 2016.12.06 23:38:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.12.06 23:38:00 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.12.06 23:38:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.12.06 23:38:00 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.12.06 23:38:00 - Ready. 2016.12.06 23:38:01 - Systems & servers data update completedI 2016.12.06 23:38:02 - Session starting.I 2016.12.06 23:38:02 - IPv6 disabled.I 2016.12.06 23:38:08 - Checking authorization ...! 2016.12.06 23:38:09 - Connecting to Cursa (United States, Miami). 2016.12.06 23:38:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:38:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:38:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:38:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:38:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link remote: [AF_INET]96.47.229.58:443. 2016.12.06 23:38:09 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.58:443, sid=66b5f82a a1377c50. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:38:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:38:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:38:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:38:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.58:443. 2016.12.06 23:38:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:38:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.21 255.255.0.0'. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:38:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:38:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:38:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:38:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:38:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.21/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:38:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.21/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:38:11 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:38:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - Starting Management Interface. 2016.12.06 23:38:16 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:38:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:38:16 - Flushing DNSI 2016.12.06 23:38:16 - Checking routeW 2016.12.06 23:38:40 - The remote name could not be resolved: 'cursa_exit.airservers.org'! 2016.12.06 23:38:40 - Disconnecting. 2016.12.06 23:38:40 - Management - Send 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:38:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:38:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:38:45 - Connection terminated.I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:38:48 - Cancel requested.I 2016.12.06 23:38:48 - IPv6 restored.! 2016.12.06 23:38:48 - Session terminated.I 2016.12.06 23:43:24 - Session starting.I 2016.12.06 23:43:24 - IPv6 disabled.I 2016.12.06 23:43:25 - Checking authorization ...! 2016.12.06 23:43:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:43:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:43:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:43:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:43:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:43:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:43:25 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=6c854023 923066a3. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Validating certificate key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:43:25 - OpenVPN > VERIFY KU OK. 2016.12.06 23:43:25 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:43:25 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:43:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:43:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:43:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:43:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:43:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:43:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:43:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:43:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:43:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:43:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:43:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - Starting Management Interface. 2016.12.06 23:43:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:43:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:43:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:43:33 - Flushing DNSI 2016.12.06 23:43:33 - Checking DNSW 2016.12.06 23:43:57 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:43:57 - Disconnecting. 2016.12.06 23:43:57 - Management - Send 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:43:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:44:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:44:02 - Connection terminated.I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:44:05 - Cancel requested.I 2016.12.06 23:44:05 - IPv6 restored.! 2016.12.06 23:44:05 - Session terminated.I 2016.12.06 23:50:11 - Session starting.I 2016.12.06 23:50:11 - IPv6 disabled.I 2016.12.06 23:50:11 - Checking authorization ...! 2016.12.06 23:50:11 - Connecting to Acamar (United States, Miami). 2016.12.06 23:50:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:50:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:50:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:50:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:50:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:50:11 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=b96b8d3e 113c910e. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:50:11 - OpenVPN > Validating certificate key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:50:11 - OpenVPN > VERIFY KU OK. 2016.12.06 23:50:11 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:50:11 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:50:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:50:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:50:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:50:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:50:14 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:50:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:50:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:50:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:50:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:50:14 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:50:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - Starting Management Interface. 2016.12.06 23:50:19 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:50:19 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:50:19 - Flushing DNSI 2016.12.06 23:50:19 - Checking DNSW 2016.12.06 23:50:43 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:50:44 - Disconnecting. 2016.12.06 23:50:44 - Management - Send 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:50:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:50:49 - Connection terminated.I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:50:49 - Cancel requested.I 2016.12.06 23:50:49 - IPv6 restored.! 2016.12.06 23:50:49 - Session terminated.I 2016.12.06 23:52:25 - Session starting.I 2016.12.06 23:52:25 - IPv6 disabled.I 2016.12.06 23:52:25 - Checking authorization ...! 2016.12.06 23:52:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:52:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:52:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:52:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=061a5617 c2c9cd1f. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Validating certificate key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:52:26 - OpenVPN > VERIFY KU OK. 2016.12.06 23:52:26 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:52:26 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:52:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:52:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:52:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:52:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:52:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:52:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - Starting Management Interface. 2016.12.06 23:52:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:52:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:52:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:52:33 - Flushing DNS! 2016.12.06 23:52:33 - Connected.. 2016.12.06 23:52:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:53:30 - Disconnecting. 2016.12.06 23:53:30 - Management - Send 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:53:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:53:35 - Connection terminated.I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:53:35 - IPv6 restored.! 2016.12.06 23:53:35 - Session terminated.I 2016.12.06 23:57:04 - Session starting.I 2016.12.06 23:57:04 - IPv6 disabled.I 2016.12.06 23:57:04 - Checking authorization ...! 2016.12.06 23:57:04 - Connecting to Acamar (United States, Miami). 2016.12.06 23:57:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:57:04 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=3144bc70 76c93ca4. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:05 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:05 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:05 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:57:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:07 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - Starting Management Interface. 2016.12.06 23:57:12 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:12 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:12 - Flushing DNS! 2016.12.06 23:57:12 - Connected.. 2016.12.06 23:57:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:57:36 - Disconnecting. 2016.12.06 23:57:36 - Management - Send 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:57:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:57:41 - Connection terminated.I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:57:44 - Checking authorization ...! 2016.12.06 23:57:44 - Connecting to Yildun (United States, Miami). 2016.12.06 23:57:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443. 2016.12.06 23:57:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2c89d04c abcce70e. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443. 2016.12.06 23:57:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.64 255.255.0.0'. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.64/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.64/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - Starting Management Interface. 2016.12.06 23:57:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:52 - Flushing DNS! 2016.12.06 23:57:52 - Connected.. 2016.12.06 23:57:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:58:03 - Disconnecting. 2016.12.06 23:58:03 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:08 - Connection terminated.I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:08 - IPv6 restored.! 2016.12.06 23:58:08 - Session terminated.I 2016.12.06 23:58:09 - Session starting.I 2016.12.06 23:58:09 - IPv6 disabled.I 2016.12.06 23:58:09 - Checking authorization ...! 2016.12.06 23:58:09 - Connecting to Acamar (United States, Miami). 2016.12.06 23:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=8e90e690 ea17a30b. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:58:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:58:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:58:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:58:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:58:12 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:58:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:58:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:58:12 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:58:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - Starting Management Interface. 2016.12.06 23:58:17 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:58:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:58:17 - Flushing DNS! 2016.12.06 23:58:17 - Connected.. 2016.12.06 23:58:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2016.12.06 23:58:32 - Disconnecting. 2016.12.06 23:58:32 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:37 - Connection terminated.I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:37 - IPv6 restored.! 2016.12.06 23:58:37 - Session terminated.I 2016.12.06 23:59:43 - Session starting.I 2016.12.06 23:59:43 - IPv6 disabled.I 2016.12.06 23:59:43 - Checking authorization ...! 2016.12.06 23:59:44 - Connecting to Acamar (United States, Miami). 2016.12.06 23:59:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:59:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:59:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:59:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:59:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=cdf0a51f fc693d36. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:59:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:59:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:59:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:59:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:59:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:59:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:59:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:59:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:59:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:59:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:59:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:59:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:59:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:59:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - Starting Management Interface. 2016.12.06 23:59:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:59:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:59:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:59:52 - Flushing DNS! 2016.12.06 23:59:52 - Connected.. 2016.12.06 23:59:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.07 00:00:12 - Disconnecting. 2016.12.07 00:00:12 - Management - Send 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > Closing TUN/TAP interface. 2016.12.07 00:00:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.07 00:00:17 - Connection terminated.I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.07 00:00:17 - IPv6 restored.! 2016.12.07 00:00:17 - Session terminated. If I could get some advice on how to fix this issue it would be much appreciated!
  13. I am running Debian Stretch. I am connecting via the Linux Command line procedure: In two separate terminals I execute: /AirVPN_America_SSH-22.sh sudo openvpn "AirVPN_America_SSH-22.ovpn" The VPN connection is working but DNS is not working. Searching other forums the /etc/openvpn/update-resolv-conf is suppose to update the DNS. Openvpn startup reports the following: The dhcp-option DNS does not appear to work. If I manually edit resolv.conf to use 10.50.0.1 then DNS works fine. Does anyone know of a fix for Debian that will have the update-resolv-conf script run properly? https://github.com/masterkorp/openvpn-update-resolv-conf Thanks
  14. Hey All, I use PfSense with AirVPN and its set up to use AirVPN DNS (10.39.0.1 IIRC) to prevent DNS leakage, however the "client" in Pfsense is configured to use europe.vpn.airdns.org which cannot resolve until the AirVPN is up. I've found out what europe.vpn.airdns.org CURRENTLY resolves to and used the IP instead to work around this, but i assume this changes frequently to manage load (correct?). So am i ok to just leave this as it is or should i be doing something else? Finally, download speed across the VPN are about 2-3Mbps when i have a 20Mbps connection - seems a little slow - anything i can check here?
  15. Hello, im connecting atm with the Alzirr NL server and i get an ip. That works fine but when i go to dnsleaktest.com it cant detect dns servers its endless loading. Here you can see it: http://imgur.com/a/pGRla And why does dnsleaktest.com detect an UK ip and ipleak/airvpn says its an NL ip? Im using the Eddie client which i guess uses openvpn? Could someone help?
  16. Hi, I got an issue. When i enable Intel VT-x in my bios, the next time i boot my pc, AirVPN can't resolve the route. It does set the ip address correct on the TAP v9 adapter. in the 10.x.x.x range and it does set the dns correct on that adapter. My TAP v9 adapter doesn't get a default gateway. Normal? On my physical adapter(virtualized Hyper-V adapter) it does set the DNS correct, but my ip address is still the same (192.168.0.x). Is this normal? AirVPN does a correct dns flush on the adapters. then it goes on checking the route. and fails. theres a screenshot attached. I also dissabled IPv6 on all adapters. Do u need more info? I'll be happy to give. Any help is much appreciated. Thanks
  17. So my girlfriend has recently started her masters in Germany, and her internet provided to her flat is from the University. She wanted a VPN and AirVPN seemed to be the most flexible choice, so we started there. Right off the bat, it seemed that the network was blocking all VPN traffic (it was impossible to connect to VPN, or even authenticate credentials while on the university network, but tethered to my phone we could connect to the VPN with no problems). It turned out to be even worse than that: even VPN over SSH is resulting in timeout errors, which seems to imply that the network is specifically blocking connections to AirVPNs hosts, as opposed to just VPN traffic (though I'll be the first to admit I'm relatively new to this and might be misdiagnosing). It turns out that the University actually had her manually set up her network with a self-assigned IP address, gateway, and manually specified DNS servers. I'm sure that's somehow related, but all I could think to try was adding another DNS (which didn't appear to help, but it also seems that the host names are being correctly resolved anyway). Any ideas would be greatly appreciated, I'm rather baffled here.
  18. Hi everybody! I'd really appreciate it if you can share some insight on the things mentioned below, thank you! My goal is to be a merchant and selling products on a couple of Shopify's websites from US IP and US geolocation. It's very important for me to have a realistic IP address and geolocation from the US (preferably Wyoming or Colorado). I've used/bought a fairly known VPN service provider but sometimes when I would type in 'My IP location' in Google it would show that the IP address is from some other location in the US or even worse – Singapore! Additionally sometimes when I would type in 'My Location' into Google the same thing would happen – it would show some different US location or Mexico. Why is that? How can this be fixed/prevented? Is it guaranteed that with the AIRVPN service this things will not happen and why? My plan is to get a new IP VPN provider where my main priority is that it shows one realistic IP address and geo-location all the time. Should I get a static IP then? Thank you. Best regards, Zdenx.
  19. hey guys, with ufw enabled, vpn connects but wget and web pages don't resolve: $uname -a Linux 4.4.0-38-generic #57-Ubuntu SMP Tue Sep 6 2016 x86_64 x86_64 x86_64 GNU/Linux $ufw reset $ufw allow out on wlp1s0 to 213.152.161.180 port 443 proto udp $ufw allow out on tun0 $ufw status verbose Status: active Logging: on (low) Default: deny (incoming), deny (outgoing), disabled (routed) New profiles: skip To Action From -- ------ ---- 213.152.161.180 443/udp ALLOW OUT Anywhere on wlp1s0 # NL-Alblasserdam_Alchiba_UDP-443.ovpn Anywhere ALLOW OUT Anywhere on tun0 # tun0 $openvpn --config ~/VPN/NL-Alblasserdam_Alchiba_UDP-443.ovpn Mon Oct 3 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Mon Oct 3 2016 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 Mon Oct 3 2016 Control Channel Authentication: tls-auth using INLINE static key file Mon Oct 3 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Socket Buffers: R=[212992->212992] S=[212992->212992] Mon Oct 3 2016 UDPv4 link local: [undef] Mon Oct 3 2016 UDPv4 link remote: [AF_INET]213.152.161.180:443 Mon Oct 3 2016 TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=b2d0c912 4505e529 Mon Oct 3 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Oct 3 2016 Validating certificate key usage Mon Oct 3 2016 ++ Certificate has key usage 00a0, expects 00a0 Mon Oct 3 2016 VERIFY KU OK Mon Oct 3 2016 Validating certificate extended key usage Mon Oct 3 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Oct 3 2016 VERIFY EKU OK Mon Oct 3 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Mon Oct 3 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Oct 3 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Oct 3 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mon Oct 3 2016 [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 Mon Oct 3 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Mon Oct 3 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.174 255.255.0.0' Mon Oct 3 2016 OPTIONS IMPORT: timers and/or timeouts modified Mon Oct 3 2016 OPTIONS IMPORT: LZO parms modified Mon Oct 3 2016 OPTIONS IMPORT: --ifconfig/up options modified Mon Oct 3 2016 OPTIONS IMPORT: route options modified Mon Oct 3 2016 OPTIONS IMPORT: route-related options modified Mon Oct 3 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Oct 3 2016 ROUTE_GATEWAY 10.42.0.1/255.255.255.0 IFACE=wlp1s0 HWADDR=xx:xx:xx:xx:xx:xx Mon Oct 3 2016 TUN/TAP device tun0 opened Mon Oct 3 2016 TUN/TAP TX queue length set to 100 Mon Oct 3 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Mon Oct 3 2016 /sbin/ip link set dev tun0 up mtu 1500 Mon Oct 3 2016 /sbin/ip addr add dev tun0 10.4.48.174/16 broadcast 10.4.255.255 Mon Oct 3 2016 /sbin/ip route add 213.152.161.180/32 via 10.42.0.1 Mon Oct 3 2016 /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 Mon Oct 3 2016 /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 Mon Oct 3 2016 Initialization Sequence Completed $route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 10.4.0.1 128.0.0.0 UG 0 0 0 tun0 0.0.0.0 10.42.0.1 0.0.0.0 UG 600 0 0 wlp1s0 10.4.0.0 0.0.0.0 255.255.0.0 U 0 0 0 tun0 10.42.0.0 0.0.0.0 255.255.255.0 U 600 0 0 wlp1s0 128.0.0.0 10.4.0.1 128.0.0.0 UG 0 0 0 tun0 169.254.0.0 0.0.0.0 255.255.0.0 U 1000 0 0 wlp1s0 213.152.161.180 10.42.0.1 255.255.255.255 UGH 0 0 0 wlp1s0 $ip addr 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: wlp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether xx:xx:xx:xx:xx:xx brd ff:ff:ff:ff:ff:ff inet 10.42.0.9/24 brd 10.42.0.255 scope global wlp1s0 valid_lft forever preferred_lft forever inet6 <removed>/64 scope link valid_lft forever preferred_lft forever 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 100 link/none inet 10.4.48.174/16 brd 10.4.255.255 scope global tun0 valid_lft forever preferred_lft forever inet6 <removed>/64 scope link flags 800 valid_lft forever preferred_lft forever i don't usually touch my iptables directly but here's the output: $iptables -L Chain INPUT (policy DROP) target prot opt source destination ufw-before-logging-input all -- anywhere anywhere ufw-before-input all -- anywhere anywhere ufw-after-input all -- anywhere anywhere ufw-after-logging-input all -- anywhere anywhere ufw-reject-input all -- anywhere anywhere ufw-track-input all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ufw-before-logging-forward all -- anywhere anywhere ufw-before-forward all -- anywhere anywhere ufw-after-forward all -- anywhere anywhere ufw-after-logging-forward all -- anywhere anywhere ufw-reject-forward all -- anywhere anywhere ufw-track-forward all -- anywhere anywhere Chain OUTPUT (policy DROP) target prot opt source destination ufw-before-logging-output all -- anywhere anywhere ufw-before-output all -- anywhere anywhere ufw-after-output all -- anywhere anywhere ufw-after-logging-output all -- anywhere anywhere ufw-reject-output all -- anywhere anywhere ufw-track-output all -- anywhere anywhere Chain ufw-after-forward (1 references) target prot opt source destination Chain ufw-after-input (1 references) target prot opt source destination ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST Chain ufw-after-logging-forward (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-logging-input (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-logging-output (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-output (1 references) target prot opt source destination Chain ufw-before-forward (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT icmp -- anywhere anywhere icmp destination-unreachable ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp parameter-problem ACCEPT icmp -- anywhere anywhere icmp echo-request ufw-user-forward all -- anywhere anywhere Chain ufw-before-input (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ufw-logging-deny all -- anywhere anywhere ctstate INVALID DROP all -- anywhere anywhere ctstate INVALID ACCEPT icmp -- anywhere anywhere icmp destination-unreachable ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp parameter-problem ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc ufw-not-local all -- anywhere anywhere ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900 ufw-user-input all -- anywhere anywhere Chain ufw-before-logging-forward (1 references) target prot opt source destination Chain ufw-before-logging-input (1 references) target prot opt source destination Chain ufw-before-logging-output (1 references) target prot opt source destination Chain ufw-before-output (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ufw-user-output all -- anywhere anywhere Chain ufw-logging-allow (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] " Chain ufw-logging-deny (2 references) target prot opt source destination RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10 LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-not-local (1 references) target prot opt source destination RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10 DROP all -- anywhere anywhere Chain ufw-reject-forward (1 references) target prot opt source destination Chain ufw-reject-input (1 references) target prot opt source destination Chain ufw-reject-output (1 references) target prot opt source destination Chain ufw-skip-to-policy-forward (0 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-skip-to-policy-input (7 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-skip-to-policy-output (0 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-track-forward (1 references) target prot opt source destination Chain ufw-track-input (1 references) target prot opt source destination Chain ufw-track-output (1 references) target prot opt source destination Chain ufw-user-forward (1 references) target prot opt source destination Chain ufw-user-input (1 references) target prot opt source destination Chain ufw-user-limit (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] " REJECT all -- anywhere anywhere reject-with icmp-port-unreachable Chain ufw-user-limit-accept (0 references) target prot opt source destination ACCEPT all -- anywhere anywhere Chain ufw-user-logging-forward (0 references) target prot opt source destination Chain ufw-user-logging-input (0 references) target prot opt source destination Chain ufw-user-logging-output (0 references) target prot opt source destination Chain ufw-user-output (1 references) target prot opt source destination ACCEPT udp -- anywhere 213.152.161.180 udp dpt:https ACCEPT all -- anywhere anywhere any help would be great. let me know if you need anymore info.
  20. Recently joined and trying to lock down the fort. How can I patch up the DNS leak? I disabled IPV6 on Ethernet 2 and Wi-Fi adapters, and IPLeak appears to pass. Just DNS leaking.
  21. A few minutes after I connect to AirVPN, my web browsers will stop connecting to the internet. Firefox reads: "Server not found." Chrome reads: "This site can’t be reached. ----.com’s server DNS address could not be found." Internet Explorer reads: "This page can’t be displayed" Bittorrent works stays connected and works, but the ipleak ip address check torrent reads: "The server name or address could not be resolved" When I turn of the VPN client, my web browsers connect again. How do I fix the problem? Logs below: I 2016.09.28 12:28:11 - Session starting. I 2016.09.28 12:28:11 - Installing tunnel driver I 2016.09.28 12:28:11 - Network adapter DHCP switched to static (Intel® Centrino® Wireless-N 2200) I 2016.09.28 12:28:15 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200) I 2016.09.28 12:28:15 - Checking authorization ... ! 2016.09.28 12:28:16 - Connecting to Spica (Canada, Toronto, Ontario) . 2016.09.28 12:28:16 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.09.28 12:28:16 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.09.28 12:28:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.28 12:28:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.28 12:28:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:17 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536] . 2016.09.28 12:28:17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.19.94.19:443 [nonblock] . 2016.09.28 12:28:18 - OpenVPN > TCP connection established with [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:18 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.09.28 12:28:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:18 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=74a370d8 f073d096 . 2016.09.28 12:28:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.28 12:28:18 - OpenVPN > Validating certificate key usage . 2016.09.28 12:28:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.28 12:28:18 - OpenVPN > VERIFY KU OK . 2016.09.28 12:28:18 - OpenVPN > Validating certificate extended key usage . 2016.09.28 12:28:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.28 12:28:18 - OpenVPN > VERIFY EKU OK . 2016.09.28 12:28:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.28 12:28:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.28 12:28:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.28 12:28:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.09.28 12:28:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.28 12:28:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.55 255.255.0.0' . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.28 12:28:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.28 12:28:22 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.28 12:28:22 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07}.tap . 2016.09.28 12:28:22 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.09.28 12:28:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.55/255.255.0.0 [sUCCEEDED] . 2016.09.28 12:28:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.55/255.255.0.0 on interface {AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.09.28 12:28:22 - OpenVPN > Successful ARP Flush on interface [14] {AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07} . 2016.09.28 12:28:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.28 12:28:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.28 12:28:27 - AirVPN Windows Interface Hack executed (Ethernet) . 2016.09.28 12:28:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.19 MASK 255.255.255.255 192.168.1.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - Starting Management Interface . 2016.09.28 12:28:32 - OpenVPN > Initialization Sequence Completed I 2016.09.28 12:28:32 - Flushing DNS I 2016.09.28 12:28:32 - Checking DNS ! 2016.09.28 12:28:44 - Connected. . 2016.09.28 12:28:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.09.28 12:28:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.09.28 12:29:14 - Updating systems & servers data ... . 2016.09.28 12:29:16 - Systems & servers data update completed . 2016.09.28 12:59:32 - Updating systems & servers data ... . 2016.09.28 12:59:35 - Systems & servers data update completed
  22. So, I have been having an ongoing issue for about month now when disconnected from AirVPN my Ethernet connection is lost and under "Network Connections" says Unidentified Network . I've read quite a bit on these forums to fix similar issues, but nothing seems to work for me. So at first it started out where when I was NOT connected to airvpn I'd lose connection and get DNS errors in Chrome. The pretty common DNS server fix where using the "netsh interface IPv4 set dnsserver Ethernet dhcp" cmd would easily correct it. Well then somehow it just stopped working. So I read how reinstalling AirVPN fixed this for a lot of people, I tried that and the issue still persists. I also read how making sure that the IPv4 DNS properties was set to "Obtain DNS server address automatically" and that also does nothing. I've made sure the network lock feature is also not on as when launching AirVPN the option says "activate" The only fix is rebooting my router which is super annoying. Please help. I apologize in advance that I know the bare minimum when it comes to networking.
  23. Hello fellow AirVPN users, Here is my issue that I'm experiencing with AirVPN: Problem: I'm experiencing issues with IPv4 and IPv6 connectivity on my Windows 10 machine. I started experiencing this shortly after installing the AirVPN client. I mainly use this machine on one of two WiFi networks (home and work) and the issue behaves differently on each network. Work Network: On my work network, "No Network Access" is displayed for both IPv4 and IPv6 connectivity on my WiFi status dialog box. I cannot make any sort of internet connection on any application on this network nor can I log-in or connect to AirVPN. I also see a yellow triangle over my WiFi icon on my Windows notifications taskbar. Home Network: After restarting/rebooting/booting/waking the computer, the WiFi status lists "No Network Access" for both IPv4 & 6 connectivity. However, when I try to log-in and start an AirVPN server connection through the client, the IPv4 connectivity status changes to "Internet" while the IPv6 connection remains on "No Network Access." The yellow triangle disappears over my taskbar WiFi icon and I'm able to connect to the internet with my browser. My IP address seems to be properly displayed as my AirVPN server's IP and no DNS leak is detected by dnsleaktest.com. However, I used to have IPv6 connectivity on this network prior to installing AirVPN client on this machine. If I disconnect and close AirVPN, the IPv4 connection remains on. Attempted Solutions: 1. Disabled network lock 2. Ran Windows Network Diagnosis: stated that machine seems to be configured correctly yet DNS connectivity cannot be obtained. 3. Ran a series of "netsh int tcp set..." commands based on the instructions at this website. No success. Any help would be appreciated. AirVPN works well on my Linux machines but it's critical that I'm able to use it on this Windows machine. Thanks!!
  24. After disconnecting from a VPS server, I (and it seems many other users) am unable to browser the internet. The reason for this is because AirVPN changes your DNS settings but does not restore them after disconnecting, which is why users are unable to connect to servers. The code needs to restore DNS settings on disconnect (or exit if the network blocking feature is activated). Cheers, f4l3m0n
×
×
  • Create New...