Jump to content
Not connected, Your IP: 3.236.57.1

Search the Community

Showing results for tags 'Eddie'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 290 results

  1. I run OSX 10.12.6 I'm using Eddie 2.15.2 I'm using the latest TBB I've had no problem running Tor over Airvpn with a tor exit node prior to the Internet. I'm trying to run Airvpn over Tor with the Airvpn server prior to the internet. I've looked at https://airvpn.org/tor, as well as every other document that seemed related to my issue. I start the tor browser first, then the Eddie client. I'm able to make a connection from Eddie to tor with the test button within the Eddie client. I'm also able to connect to an airvpn server. However, when I test what my ip address is from the tor browser, it returns the tor exit node address, not the airvpn server address. And when I try another browser, which is not proxied through tor, the ip address returned is that of the airvpn server address. So essentially what I'm seeing is Tor over Airvpn, not Airvpn over Tor. The only difference between connecting using the "tor" proxy in Eddie preferences instead of "none" is that I no longer can directly access .onion sites. Any insight into this issue would be appreciated. AirvpnLog.txt AirvpnSystemReport.txt
  2. greetings, I'm currently testing out AirVPN before buying a longer subscription. However I currently have some trouble with WebRTC leaks of my IPv6 address. My setup is the following: Arch Linux 64 BitEddie 2.15.2Network Lock enabledChrome/FirefoxUBlock origin option to prevent WebRTC leaks enabled.ISP Unitymedia DSLite (IPv6) When I connect to a suggested server (with network lock enabled) and check IPLeak.net, it looks like this: The address seen under WebRTC IPv6 is the same when not connected, so something is definitely leaking. I tried with both Firefox and Chrome. Is there a way to solve this issue? Can WebRTC leaks be an issue when using torrents? Regards
  3. I have Cisco Anyconnect installed on one of my windows machines. This software remains installed at all times, but it is not used for as a vpn unless I need to access some work related resources. Is it possible to have Eddie installed and use when I'm not using Cisco. I understand that I would have to disconnect from Air/Eddie to briefly use Cisco. Basically what I am asking is would have two vpn softwares installed break anything?
  4. Hi, I know that you can't use network lock in conjunction with the Tor over VPN feature, but I don't want to have to choose between extra anonymity and the scare of a possible leak. Is there anyway to use the Tor over VPN feature, while also using a killswitch? I've looked around the forums here and on other sites, but I haven't found anything useful or that actually worked. So how do other people find a way to use Tor over VPN with a kill switch type fail safe? I use a mac computer along with the eddie application.
  5. good Morning I have the following question for you. I use Manjaro Linux in the latest version. And would like to use AirVPN, I've also downloaded the file down. However, I honestly do not know how to install AirVPN, because there is no manual. And of course also so that it starts with the computer restart. Would someone help me please? I would be very happy - thank you!
  6. I am using the Eddie for Android latest version, and with the IPv6 setting set to "request", and when I connect to one of the IPv6 enabled servers such as Capricornus, I do not have IPv6 connectivity, only IPv4. ipleak.net only shows the VPN IPv4 address, and I am unable to view IPv6 only sites such as ipv6.google.com. how can I fix this and be able to use the VPN'S IPv6 address?
  7. Hi, up until recently, Apple's AirDrop file transfer protocol would work even when network lock was turned on in Eddie. In v2.15.2 this no longer works. Does anybody know a specific setting that may have changed to enable this feature again?
  8. Hi Just upgraded AirVPN client from 2.13.6 to 2.15.2. I have one problem: Where is all my events options. I am closing down some programs if the vpn connection is down. In version 2.13 it was under the tap Events, this Events tap is gone in version 2.15.... Where is it?
  9. Hello: eddie connects but then i have no internet access. have tried multiple canadian servers. logs below. any support would be appreciated, thank you. Eddie System/Environment Report - 6/10/2018 8:08 PM UTC Eddie version: 2.14.5Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.17134.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\j&a\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\Eddie-UI.exeCommand line arguments: (1 args) path="home"Network Lock Active: Yes, Windows Filtering PlatformConnected to VPN: Yes, LesathDetected DNS: 10.0.0.1, 10.4.0.1, 2001:4e8:0:4007::15, 2001:4e8:0:4009::11Test DNS IPv4: OkTest DNS IPv6: FailedTest Ping IPv4: 80 msTest Ping IPv6: -1 msTest HTTP IPv4: OkTest HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.websiteTest HTTPS: Ok----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: True ----------------------------Logs: . 2018.06.10 12:45:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.06.10 12:45:17 - Reading options from C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml. 2018.06.10 12:45:17 - Profile options not found, using defaults.. 2018.06.10 12:45:17 - Command line arguments (1): path="home". 2018.06.10 12:45:18 - Cannot find tunnel adapter.E 2018.06.10 12:45:19 - OpenVPN Driver - Not available - Will be installed at next connection.. 2018.06.10 12:45:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.06.10 12:45:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.06.10 12:45:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.06.10 12:45:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.06.10 12:45:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2018.06.10 12:45:20 - Updating systems & servers data ...I 2018.06.10 12:45:20 - Ready. 2018.06.10 12:45:21 - Systems & servers data update completedI 2018.06.10 12:46:04 - Checking login ...! 2018.06.10 12:46:05 - Logged in.! 2018.06.10 12:46:14 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 12:46:18 - Session starting.. 2018.06.10 12:46:18 - Cannot find tunnel adapter.! 2018.06.10 12:46:18 - Installing tunnel driverI 2018.06.10 12:46:22 - Checking authorization .... 2018.06.10 12:46:22 - IPv6 disabled with packet filtering.! 2018.06.10 12:46:22 - Connecting to Gorgonea (Canada, Toronto, Ontario). 2018.06.10 12:46:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:46:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:46:23 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:46:23 - Connection to OpenVPN Management Interface. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:46:23 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:46:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=01bc53b3 755548eb. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > VERIFY KU OK. 2018.06.10 12:46:23 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:46:23 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:46:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443. 2018.06.10 12:46:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.115 255.255.0.0,peer-id 26,cipher AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 12:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:46:24 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:46:24 - OpenVPN > open_tun. 2018.06.10 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.115/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.115/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:46:24 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:46:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:46:29 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:46:29 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:46:29 - Routes, added a new route, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:46:29 - Flushing DNSI 2018.06.10 12:46:32 - Checking route IPv4I 2018.06.10 12:46:33 - Checking DNS! 2018.06.10 12:46:45 - Connected.. 2018.06.10 12:46:45 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:46:45 - OpenVpn Management > ENTER PASSWORD:! 2018.06.10 12:47:31 - Disconnecting. 2018.06.10 12:47:31 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:47:31 - Sending management termination signal. 2018.06.10 12:47:31 - Management - Send 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 12:47:36 - OpenVPN > TAP: DHCP address released. 2018.06.10 12:47:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 12:47:36 - Connection terminated.. 2018.06.10 12:47:36 - IPv6 restored with packet filtering.. 2018.06.10 12:47:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 12:47:36 - DNS leak protection with packet filtering disabled.. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 12:47:36 - Flushing DNS! 2018.06.10 12:47:39 - Session terminated.! 2018.06.10 12:47:40 - Deactivation of Network LockI 2018.06.10 12:49:02 - Session starting.I 2018.06.10 12:49:02 - Checking authorization .... 2018.06.10 12:49:02 - IPv6 disabled with packet filtering.! 2018.06.10 12:49:02 - Connecting to Alwaid (Canada, Toronto, Ontario). 2018.06.10 12:49:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:49:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:49:03 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:49:03 - Connection to OpenVPN Management Interface. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:49:03 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:49:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=820316e9 17d858a1. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:49:03 - OpenVPN > VERIFY KU OK. 2018.06.10 12:49:03 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:49:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:49:03 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:49:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:49:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443. 2018.06.10 12:49:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:49:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.174 255.255.0.0'. 2018.06.10 12:49:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:49:07 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:49:07 - OpenVPN > open_tun. 2018.06.10 12:49:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:49:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:49:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.174/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:49:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.174/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:49:07 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:49:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:49:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:49:12 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:49:12 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:49:12 - Routes, added a new route, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 12:49:12 - Flushing DNSI 2018.06.10 12:49:16 - Checking route IPv4I 2018.06.10 12:49:16 - Checking DNS! 2018.06.10 12:49:29 - Connected.. 2018.06.10 12:49:29 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:49:29 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 12:56:00 - Updating systems & servers data .... 2018.06.10 12:56:01 - Systems & servers data update completed. 2018.06.10 12:57:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #68630 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2018.06.10 13:00:59 - Above log line repeated 19 times more! 2018.06.10 13:00:59 - Disconnecting. 2018.06.10 13:00:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 13:00:59 - Sending management termination signal. 2018.06.10 13:00:59 - Management - Send 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:01:04 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:01:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:01:04 - Connection terminated.. 2018.06.10 13:01:04 - IPv6 restored with packet filtering.. 2018.06.10 13:01:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:01:04 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 13:01:04 - Flushing DNS! 2018.06.10 13:01:07 - Session terminated.! 2018.06.10 13:01:09 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 13:01:18 - Session starting.I 2018.06.10 13:01:18 - Checking authorization .... 2018.06.10 13:01:18 - IPv6 disabled with packet filtering.! 2018.06.10 13:01:18 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.06.10 13:01:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:01:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:01:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:01:19 - Connection to OpenVPN Management Interface. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:01:19 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:01:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=047e9ced e53fae6b. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > VERIFY KU OK. 2018.06.10 13:01:19 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:01:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:01:19 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:01:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.06.10 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:01:25 - Above log line repeated 1 times more. 2018.06.10 13:01:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.48 255.255.0.0'. 2018.06.10 13:01:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:01:25 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:01:25 - OpenVPN > open_tun. 2018.06.10 13:01:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:01:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:01:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.48/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:01:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.48/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:01:25 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:01:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:01:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:01:31 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:01:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:01:31 - Routes, added a new route, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:01:31 - Flushing DNSI 2018.06.10 13:01:34 - Checking route IPv4I 2018.06.10 13:01:35 - Checking DNS! 2018.06.10 13:01:47 - Connected.. 2018.06.10 13:01:47 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:01:47 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 13:06:36 - Updating systems & servers data .... 2018.06.10 13:06:38 - Systems & servers data update completed! 2018.06.10 13:06:56 - Disconnecting. 2018.06.10 13:06:56 - Routes, removed a route previously added, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:06:56 - Sending management termination signal. 2018.06.10 13:06:56 - Management - Send 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:07:01 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:07:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:07:01 - Connection terminated.. 2018.06.10 13:07:01 - IPv6 restored with packet filtering.. 2018.06.10 13:07:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:07:01 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.06.10 13:07:01 - Checking authorization .... 2018.06.10 13:07:02 - IPv6 disabled with packet filtering.! 2018.06.10 13:07:02 - Connecting to Lesath (Canada, Toronto, Ontario). 2018.06.10 13:07:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:07:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:07:02 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:07:02 - Connection to OpenVPN Management Interface. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:07:02 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:07:02 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=3f473ba1 678b1534. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > VERIFY KU OK. 2018.06.10 13:07:02 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:07:02 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:07:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443. 2018.06.10 13:07:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:07:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.129 255.255.0.0,peer-id 35,cipher AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 13:07:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:07:03 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:07:03 - OpenVPN > open_tun. 2018.06.10 13:07:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:07:03 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:07:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.129/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:07:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.129/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:07:03 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:07:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:07:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.2 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:07:09 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:07:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:07:09 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1. 2018.06.10 13:07:09 - Flushing DNSI 2018.06.10 13:07:12 - Checking route IPv4I 2018.06.10 13:07:13 - Checking DNS! 2018.06.10 13:07:25 - Connected.. 2018.06.10 13:07:25 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:07:25 - OpenVpn Management > ENTER PASSWORD: ----------------------------Network Interfaces and Routes: {"support_ipv4": true,"support_ipv6": true,"routes": [{"address": "0.0.0.0\/0","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "0.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "10.0.0.0\/24","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.28","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.4.0.0\/16","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.12.129","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "127.0.0.0\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.0.0.1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "128.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "184.75.221.2","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "184.75.221.3","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "4"},{"address": "224.0.0.0\/4","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "224.0.0.0\/4","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "224.0.0.0\/4","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "255.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "255.255.255.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "255.255.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "::1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "2604:3d08:807f:fff2::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2::4b9b","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:6068:eaf3:7657:beff","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "fe80::d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::1923:642e:f94e:9d84","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "ff00::\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "ff00::\/8","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "ff00::\/8","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"}],"interfaces": [{"friendly": "Ethernet 2","id": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","name": "Ethernet 2","description": "TAP-Windows Adapter V9","type": "Ethernet","status": "Up","bytes_received": "187651520","bytes_sent": "8967995","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1923:642e:f94e:9d84","10.4.12.129"],"gateways": ["10.4.0.1"],"bind": true,"dns4": "10.4.0.1","dns6": ""},{"friendly": "Ethernet","id": "{3734B147-25DA-4BF8-A5D2-DC0198F2AEDE}","name": "Ethernet","description": "Intel® Ethernet Connection (2) I219-V","type": "Ethernet","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::9af:cbb8:5bf6:daf5","169.254.218.245"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 1","id": "{CDE07587-CBC4-4511-98F0-1DE08E03741B}","name": "Local Area Connection* 1","description": "Microsoft Wi-Fi Direct Virtual Adapter","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1826:7eb5:c160:2961","169.254.41.97"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 2","id": "{5D425C74-E6CB-4C46-B97E-37E055CB402F}","name": "Local Area Connection* 2","description": "Microsoft Wi-Fi Direct Virtual Adapter #2","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::6cce:906e:581f:8776","169.254.135.118"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Wi-Fi","id": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","name": "Wi-Fi","description": "D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter","type": "Wireless80211","status": "Up","bytes_received": "1266311438","bytes_sent": "38479803","support_ipv4": true,"support_ipv6": true,"ips": ["2604:3d08:807f:fff2::4b9b","2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","2604:3d08:807f:fff2:6068:eaf3:7657:beff","fe80::d9a:651b:8f8c:3d75","10.0.0.28"],"gateways": ["10.0.0.1"],"bind": true,"dns4": "","dns6": ""},{"friendly": "Loopback Pseudo-Interface 1","id": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","name": "Loopback Pseudo-Interface 1","description": "Software Loopback Interface 1","type": "Loopback","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["::1","127.0.0.1"],"gateways": [],"bind": true,"dns4": "","dns6": null}],"ipv4-default-gateway": "10.4.0.1","ipv4-default-interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}"}----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-UP0BGVO Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : vc.shawcable.net Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-F8-AA-B3-0B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::1923:642e:f94e:9d84%40(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.12.129(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 1:07:03 PM Lease Expires . . . . . . . . . . : Monday, June 10, 2019 1:07:03 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 671154168 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel® Ethernet Connection (2) I219-V Physical Address. . . . . . . . . : 40--5C-E5-42-9D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 7A-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : vc.shawcable.net Description . . . . . . . . . . . : D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2::4b9b(Preferred) Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:40 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:31:47 AM IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2:d9a:651b:8f8c:3d75(Deprecated) Temporary IPv6 Address. . . . . . : 2604:3d08:807f:fff2:6068:eaf3:7657:beff(Deprecated) Link-local IPv6 Address . . . . . : fe80::d9a:651b:8f8c:3d75%17(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.28(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:35 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:52:35 AM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 158872091 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 2001:4e8:0:4009::11 2001:4e8:0:4007::15 10.0.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled
  10. I would like for someone to offer a clear explanation of the "Protocols" tab under "Settings" for Eddie. More specifically, what do the numbers (1, 2, 3, 4) under the heading of "IP" refer to? Also, if an explanation is necessary, how does the "IP" heading pertain to the other headings found under the "Protocols" tab? If this question has been answered elsewhere in the forums, I do apologize for my blindness and inability to find it. Thanks in advance to the person(s) answering this n00b question.
  11. I am having difficulties installing the eddie-ui_2.13.6_linux_x64_debian.deb file on my Kubuntu 18.04 install as it gives the error message "Cannot satisfy dependencies". I've searched the forums but there's been no solution to this problem. A screenshot of the installer showing the error message has been attached to the post. How can I fix this? https://i.imgur.com/EbsKYlM.png
  12. So, yesterday night I logged in on airvpn to check the remaining time of my subscription and I randomly navigated through the forums to see what's new. And to my surprise I found that Eddie is on 2.14.4 version, while the version I was using was 2.10. And this has troubled me ever since. Is there a reason why there isn't an autoupdate/check for updates feature on Eddie? To my knowledge, even the most basic/indie/FOSS programs have a "check for update" option implemented. I would like to know the reasoning behind this. Thank you!
  13. Hello, dear developers! Any news on making Linux native version of Eddie? Thank you!
  14. So when I download torrents and other data I appear to have thing configured properly. Using a forwarded port, setting QTorrent to use only ethernet (the connection AirVpn is using through Eddie) and setting eddie to Force use of the VPN or it will kill all connections. The speeds I'm getting on the server are decent like 5 MBp/s that is Megabytes per second. I've also used Ipleak and other leak tests for Qtorrent and NONE of them show any leaks to my actual IP. Ok, so that's all good news, but why when I open Eddie to the Overview page it shows that my download speed is like 60 Mbps as in Megabits per second which would be around 600 Kilobytes. This is not accurately showing the actual download speeds I get, or the upload speeds. Why is this happening? I appreciate the help!
  15. running headless eddie 2.12.4 on ubuntu 14.04 using this command sudo /usr/bin/airvpn -cli -login='xxx' -password='xxx' -connect -netlock i got hit with a dmca notice on my server ip. i checked logs and saw that the vpn disconnected for a moment and it looks like the netlock did not work as the real ip was exposed.
  16. Question... If I just click the "X" in the upper right corner to close the program, Eddie doesn't always automatically deactivate the network lock. Sometimes it does, and sometimes it doesn't. Is this a bug, or am I using the program incorrectly? What I mean is, am I always supposed to click the Deactivate button before exiting Eddie? If I do that, it always works. I'm using Eddie 2.12.4 on Linux Mint 18.1 Serena.
  17. Hello, I'm trying to use Eddie with other VPN providers and comparing it with OpenVPN GUI. ZoogVPN, and vpnbook .ovpn config files both work with OpenVPN GUI and Eddie. FinchVPN config file works with OpenVPN GUI but does not work with Eddie. I suspect it has something to do with a FinchVPN account.key file that I have in the config directory that Eddie is not picking up or something like that. Any ideas what I should do? Thanks
  18. hi and thanks for your great software when I connecting to AirVPN, my Norton MacOs Antivirus warning me, some ip wants to connect this: "security_authtrampoline" 1-what is this? 2-its ok to allowed or not? 3-if I allowed hackers can to connecting too? or just Airvpn?
  19. Hi! We have work witout problems with eddie client , in a few days all servers its really slow some 3 or 15 mb and i dont understand why change browser , check firewall and antivirus rules , and i cannt see any error in log files any help ??or what i need check? have windows 8 service pack 1 os 64bits my connection 100 MB down 30 up regards!
  20. Hello, I've seen a few forum posts on this topic, but nothing that provides consistent direction. Setting up an Ubuntu server that's command line only (no GUI.) There seem to be a few options here to: 1. Connect the VPN on boot. 2. Lock traffic if the VPN drops. You could use Eddie via CLI and set it up to run on boot. You could call a generated openvpn config directly on boot and add appropriate iptables rules. Is one method preferred over the other from a security perspective? Does anyone have a good list of iptables rules I could combine with auto-launching openvpn if Eddie is not used? I could copy the rules applied by Eddie, but those are dynamically updated based on the AirVPN server list it seems (to allow those connections). Thanks! Jeff
  21. Eddie IS without a doubt leaking lastpass connections to the web through the vpn. Eddie is still using the 2.4.3 client; though seeing eddie is a big program it could be some other function of Eddie. Using OpenVPN 2.4.5 solves this leakage. So, OpenVPN 2.4.5 it is. Here is a screenshot of the leak inside Wireshark. https://ibb.co/jgdQqH https://image.ibb.co/gzbBVH/Leaks_using_Eddie.png
  22. . 2018.03.11 19:21:26 - Eddie version: 2.14.2 / linux_x64, System: Linux, Name: Manjaro Linux \r (\n) (\l), Version: Linux my-manjaro 4.14.24-1-MANJARO #1 SMP PREEMPT Sun Mar 4 21:28:02 UTC 2018 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319 . 2018.03.11 19:21:26 - Reading options from /home/smoresel/.airvpn/AirVPN.xml . 2018.03.11 19:21:26 - Command line arguments (3): path="/home/smoresel/.airvpn" path.resources="/usr/share/AirVPN" console.mode="none" . 2018.03.11 19:21:28 - OpenVPN Driver - Found, /dev/net/tun . 2018.03.11 19:21:28 - OpenVPN - Version: 2.4.5 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.10 (/sbin/openvpn) . 2018.03.11 19:21:28 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0g 2 Nov 2017 (/sbin/ssh) When starting Eddie, under Overview, I see Starting with a progress bar that appears to move but no progress is made. I've waited at least ten minutes in the past.
  23. Hello, As the title suggests, I'm having issues with Eddie for Win10. The software works like a charm, I never had any problem with it. The only issue, if this deserves this name, is that everytime I shut down the computer, I have to manually close Eddie. When trying to automatically shutdown, the system complains saying that this software is preventing Win10 from shutting down properly. So, is there any configuration or setting I should modify to shut it down cleanly and automatically when I shut down windows or is just another security measure to prevent leakings? Thank you
  24. I've seen many posts on this where they say the solution is to go into settings and turn off dns checks, but as I'm running Eddie from a CLI I can't find a settings file to change. I 2018.03.10 20:52:38 - Session starting. I 2018.03.10 20:52:38 - Checking authorization ... ! 2018.03.10 20:52:39 - Connecting to Almach (Canada, Toronto, Ontario) . 2018.03.10 20:52:39 - OpenVPN > OpenVPN 2.4.3 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 9 2017 . 2018.03.10 20:52:39 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.03.10 20:52:39 - Connection to OpenVPN Management Interface . 2018.03.10 20:52:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.03.10 20:52:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.03.10 20:52:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.03.10 20:52:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.12:443 . 2018.03.10 20:52:39 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.03.10 20:52:39 - OpenVPN > UDP link local: (not bound) . 2018.03.10 20:52:39 - OpenVPN > UDP link remote: [AF_INET]199.19.94.12:443 . 2018.03.10 20:52:39 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.12:443, sid=3958ac30 e5b2bfd4 . 2018.03.10 20:52:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.03.10 20:52:39 - OpenVPN > VERIFY KU OK . 2018.03.10 20:52:39 - OpenVPN > Validating certificate extended key usage . 2018.03.10 20:52:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.03.10 20:52:39 - OpenVPN > VERIFY EKU OK . 2018.03.10 20:52:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org . 2018.03.10 20:52:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.03.10 20:52:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.03.10 20:52:39 - OpenVPN > [Almach] Peer Connection Initiated with [AF_INET]199.19.94.12:443 . 2018.03.10 20:52:40 - OpenVPN > SENT CONTROL [Almach]: 'PUSH_REQUEST' (status=1) . 2018.03.10 20:52:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.80 255.255.0.0,peer-id 49,cipher AES-256-GCM' . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2018.03.10 20:52:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.03.10 20:52:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.03.10 20:52:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.03.10 20:52:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.03.10 20:52:40 - OpenVPN > ROUTE_GATEWAY 192.168.86.1/255.255.255.0 IFACE=ens33 HWADDR=90:fb:a6:02:98:45 . 2018.03.10 20:52:40 - OpenVPN > TUN/TAP device tun0 opened . 2018.03.10 20:52:40 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.03.10 20:52:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.03.10 20:52:40 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2018.03.10 20:52:40 - OpenVPN > /sbin/ip addr add dev tun0 10.4.24.80/16 broadcast 10.4.255.255 . 2018.03.10 20:52:45 - OpenVPN > /sbin/ip route add 199.19.94.12/32 via 192.168.86.1 . 2018.03.10 20:52:45 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.03.10 20:52:45 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.03.10 20:52:45 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.03.10 20:52:45 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.03.10 20:52:45 - Flushing DNS I 2018.03.10 20:52:46 - Checking route I 2018.03.10 20:52:47 - Checking DNS . 2018.03.10 20:52:47 - Checking DNS failed: . 2018.03.10 20:52:47 - Checking DNS (2° try) . 2018.03.10 20:52:49 - Checking DNS failed: . 2018.03.10 20:52:49 - Checking DNS (3° try) . 2018.03.10 20:52:51 - Checking DNS failed: E 2018.03.10 20:52:51 - Checking DNS failed. . 2018.03.10 20:52:51 - OpenVPN > Initialization Sequence Completed ! 2018.03.10 20:52:51 - Disconnecting . 2018.03.10 20:52:51 - Sending management termination signal . 2018.03.10 20:52:51 - Management - Send 'signal SIGTERM' I 2018.03.10 20:52:52 - Break signal received. Shutdown. Hit again to force break. . 2018.03.10 20:52:52 - Connection terminated. . 2018.03.10 20:52:52 - DNS of the system restored to original settings (Rename method) . 2018.03.10 20:52:52 - Shutdown in progress I 2018.03.10 20:52:53 - Cancel requested. ! 2018.03.10 20:52:53 - Session terminated. ! 2018.03.10 20:52:54 - Logged out. . 2018.03.10 20:52:54 - Shutdown complete
×
×
  • Create New...