Jump to content
Not connected, Your IP: 54.225.35.224

Search the Community

Showing results for tags 'Windows 10'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 53 results

  1. I have a Win 10 pc and all of a sudden a few days ago I became unable to connect. The PC has internet (had to reset the DNS to get this though). I have tried restoring PC as well as upgrading and downgrading eddie and the Taps drivers. Am lost now, HELP I 2016.05.06 19:48:19 - Session starting. I 2016.05.06 19:48:19 - Checking authorization ... ! 2016.05.06 19:48:19 - Connecting to Zibal (Netherlands, Alblasserdam) . 2016.05.06 19:48:19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.05.06 19:48:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.05.06 19:48:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2016.05.06 19:48:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.05.06 19:48:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.05.06 19:48:19 - OpenVPN > UDPv4 link local: [undef] . 2016.05.06 19:48:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.148:443, sid=6d9eb402 5f7fd641 . 2016.05.06 19:48:19 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:19 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:22 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:22 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:23 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:23 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.05.06 19:48:24 - OpenVPN > Validating certificate key usage . 2016.05.06 19:48:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.05.06 19:48:24 - OpenVPN > VERIFY KU OK . 2016.05.06 19:48:24 - OpenVPN > Validating certificate extended key usage . 2016.05.06 19:48:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.05.06 19:48:24 - OpenVPN > VERIFY EKU OK . 2016.05.06 19:48:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #7 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #8 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #9 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #11 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #13 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #14 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #15 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #16 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #18 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #19 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #20 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #21 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #22 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #23 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #24 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #25 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #27 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:29 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #28 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:29 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #29 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #30 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #31 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #32 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #33 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #34 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #37 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #38 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #39 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #40 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.06 19:48:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.06 19:48:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.05.06 19:48:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #41 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.05.06 19:48:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.144 255.255.0.0' . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.05.06 19:48:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.05.06 19:48:38 - OpenVPN > open_tun, tt->ipv6=0 . 2016.05.06 19:48:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BFA0CAE0-2727-4019-B285-69416297C740}.tap . 2016.05.06 19:48:38 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.05.06 19:48:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.144/255.255.0.0 [sUCCEEDED] . 2016.05.06 19:48:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.144/255.255.0.0 on interface {BFA0CAE0-2727-4019-B285-69416297C740} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.05.06 19:48:38 - OpenVPN > Successful ARP Flush on interface [7] {BFA0CAE0-2727-4019-B285-69416297C740} . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #42 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.148 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - Starting Management Interface . 2016.05.06 19:48:44 - OpenVPN > Initialization Sequence Completed I 2016.05.06 19:48:44 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.05.06 19:48:44 - DNS of a network adapter forced (Intel® 82579V Gigabit Network Connection) I 2016.05.06 19:48:44 - Flushing DNS I 2016.05.06 19:48:44 - Checking route W 2016.05.06 19:49:44 - The operation has timed out . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #7 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #8 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #9 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings ! 2016.05.06 19:49:44 - Disconnecting . 2016.05.06 19:49:44 - Management - Send 'signal SIGTERM' . 2016.05.06 19:49:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.05.06 19:49:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.05.06 19:49:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.148 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > Closing TUN/TAP interface . 2016.05.06 19:49:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.05.06 19:49:49 - Connection terminated. I 2016.05.06 19:49:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.05.06 19:49:49 - DNS of a network adapter restored to original settings (Intel® 82579V Gigabit Network Connection) I 2016.05.06 19:49:52 - Cancel requested. ! 2016.05.06 19:49:52 - Session terminated.
  2. Hi all, I recently went from 1Mbps service to using my cricket wireless via usb tethering which is 8Mbps (not fast but best i can get where i am). I want to use AirVPN to hide the fact that I am tethering since on the "unlimited" plan they don't let you tether (I am not rooted but am using Foxfi to bypass this). my problem is that I have downloaded OpenVPN for android and installed it on my phone while following the instructions on this site, but have no knowledge of how to port forward anything, the few instructions I have tried to follow as well as multiple google searches have produced nothing but aggravation, I'm sure it's something very simple that I'm not doing or configuring correctly. Any kind of assistance with this would be greatly appreciated. Thanks.
  3. Hello! I'm getting disconnects and tried some solutions. But obviously nothing helped. Infos: Windows 10 (up-to-date) TAP 9.9.2_3 (9.21.2 changes nothing, Updating deactivated) TAP V9 Options -> Advanced -> Media Status: Always Connected Eddy 2.11.3 Driver Update Disabled Buffer Size: 256 KB I uninstalled Eddy and deleted all Files several times and resetted the Windows Firewall Settings to default. Went into Windows Safe Mode to uninstall the TAP Driver and installed TAP 9.9.2_3. Then rebooted normally and installed Eddy 2.11.3 again. But I'm still getting disconnects ... or 0 bit/s I 2016.10.06 17:22:56 - Eddie client version: 2.11.3 / x64, System: Windows, Name: Microsoft Windows NT 10.0.10586.0 / x64 . 2016.10.06 17:22:56 - Reading options from C:\Users\-Nocturnoz-\AppData\Local\AirVPN\AirVPN.xml . 2016.10.06 17:22:57 - Data Path: C:\Users\-Nocturnoz-\AppData\Local\AirVPN . 2016.10.06 17:22:57 - App Path: C:\Program Files\AirVPN . 2016.10.06 17:22:57 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.10.06 17:22:57 - Command line arguments (1): path="home" . 2016.10.06 17:22:57 - Operating System: Microsoft Windows NT 10.0.10586.0 W 2016.10.06 17:22:57 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.2. E 2016.10.06 17:22:57 - OpenVPN Driver - Not available - Will be installed at next connection. I 2016.10.06 17:22:57 - OpenVPN - Version: OpenVPN 2.3.11 (C:\Program Files\AirVPN\openvpn.exe) I 2016.10.06 17:22:57 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.10.06 17:22:57 - SSL - Version: stunnel 5.32 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.10.06 17:22:57 - Ready . 2016.10.06 17:22:57 - Updating systems & servers data ... . 2016.10.06 17:22:57 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (Die Verbindung mit dem Remoteserver kann nicht hergestellt werden.) W 2016.10.06 17:23:05 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.2. I 2016.10.06 17:24:31 - Checking login ... F 2016.10.06 17:24:31 - Cannot login. (Die Verbindung mit dem Remoteserver kann nicht hergestellt werden.) I 2016.10.06 17:24:44 - Checking login ... ! 2016.10.06 17:24:45 - Logged in. ! 2016.10.06 17:24:47 - Activation of Network Lock - Windows Filtering Platform I 2016.10.06 17:24:49 - Session starting. I 2016.10.06 17:24:49 - IPv6 disabled with packet filtering. I 2016.10.06 17:24:49 - Checking authorization ... ! 2016.10.06 17:24:50 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2016.10.06 17:24:50 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 17:24:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 17:24:50 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 17:24:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 17:24:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 17:24:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 17:24:50 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 17:24:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443 . 2016.10.06 17:24:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=b94c2548 a6c8f076 . 2016.10.06 17:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 17:24:50 - OpenVPN > Validating certificate key usage . 2016.10.06 17:24:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 17:24:50 - OpenVPN > VERIFY KU OK . 2016.10.06 17:24:50 - OpenVPN > Validating certificate extended key usage . 2016.10.06 17:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 17:24:50 - OpenVPN > VERIFY EKU OK . 2016.10.06 17:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 17:24:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 17:24:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 17:24:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 17:24:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443 . 2016.10.06 17:24:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 17:24:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.165 255.255.0.0' . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 17:24:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 17:24:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 17:24:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 17:24:53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 17:24:53 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 17:24:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.165/255.255.0.0 [SUCCEEDED] . 2016.10.06 17:24:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.165/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.06 17:24:53 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 17:24:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - Starting Management Interface . 2016.10.06 17:24:57 - OpenVPN > Initialization Sequence Completed I 2016.10.06 17:24:57 - DNS leak protection with packet filtering enabled. I 2016.10.06 17:24:57 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) I 2016.10.06 17:24:57 - Flushing DNS I 2016.10.06 17:24:57 - Checking route I 2016.10.06 17:25:06 - Checking DNS ! 2016.10.06 17:25:06 - Connected. . 2016.10.06 17:25:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 17:25:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 17:30:50 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5557 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:30:50 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5558 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12565 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12660 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12661 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17498 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:28 - Updating systems & servers data ... . 2016.10.06 17:33:28 - Systems & servers data update completed . 2016.10.06 17:34:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26903 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:34:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26904 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35154 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35155 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:52 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:52 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36962 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #38162 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #45107 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #45108 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #70478 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #70479 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #73553 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #73554 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:42:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #74219 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:42:51 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #76696 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:43:40 - Updating systems & servers data ... . 2016.10.06 17:43:41 - Systems & servers data update completed . 2016.10.06 17:53:47 - Updating systems & servers data ... . 2016.10.06 17:53:47 - Systems & servers data update completed . 2016.10.06 18:03:51 - Updating systems & servers data ... . 2016.10.06 18:03:52 - Systems & servers data update completed . 2016.10.06 18:13:55 - Updating systems & servers data ... . 2016.10.06 18:13:55 - Systems & servers data update completed . 2016.10.06 18:16:44 - OpenVPN > TUN/TAP I/O operation aborted, restarting . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.10.06 18:16:44 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:16:44 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:16:44 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.10.06 18:16:44 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:16:44 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:16:44 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:16:44 - OpenVPN > Closing TUN/TAP interface . 2016.10.06 18:16:44 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting . 2016.10.06 18:16:44 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:16:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:16:44 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:16:44 - OpenVPN > Restart pause, 10 second(s) ! 2016.10.06 18:16:44 - Disconnecting . 2016.10.06 18:16:44 - Management - Send 'signal SIGTERM' . 2016.10.06 18:16:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.06 18:16:44 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.10.06 18:16:44 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.10.06 18:16:44 - Connection terminated. I 2016.10.06 18:16:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) I 2016.10.06 18:16:44 - DNS leak protection with packet filtering disabled. I 2016.10.06 18:16:49 - Checking authorization ... ! 2016.10.06 18:16:49 - Connecting to Gienah (Netherlands, Alblasserdam) . 2016.10.06 18:16:49 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:16:49 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:16:49 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:16:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 18:16:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 18:16:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 18:16:50 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 18:16:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.95:53 . 2016.10.06 18:16:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.95:53, sid=1e8e0b6a 828336bd . 2016.10.06 18:16:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 18:16:50 - OpenVPN > Validating certificate key usage . 2016.10.06 18:16:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 18:16:50 - OpenVPN > VERIFY KU OK . 2016.10.06 18:16:50 - OpenVPN > Validating certificate extended key usage . 2016.10.06 18:16:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 18:16:50 - OpenVPN > VERIFY EKU OK . 2016.10.06 18:16:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 18:16:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:16:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:16:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 18:16:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.95:53 . 2016.10.06 18:16:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 18:16:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.8 255.255.0.0' . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 18:16:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 18:16:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 18:16:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 18:16:52 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 18:16:52 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 18:16:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.8/255.255.0.0 [SUCCEEDED] . 2016.10.06 18:16:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.8/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.8.255.254, lease-time: 31536000] . 2016.10.06 18:16:52 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 18:16:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.10.06 18:16:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.10.06 18:16:58 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.10.06 18:17:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - Starting Management Interface . 2016.10.06 18:17:02 - OpenVPN > Initialization Sequence Completed I 2016.10.06 18:17:02 - DNS leak protection with packet filtering enabled. I 2016.10.06 18:17:02 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1) I 2016.10.06 18:17:02 - Flushing DNS I 2016.10.06 18:17:02 - Checking route I 2016.10.06 18:17:05 - Checking DNS ! 2016.10.06 18:17:05 - Connected. . 2016.10.06 18:17:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 18:17:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 18:19:50 - Updating systems & servers data ... ! 2016.10.06 18:19:52 - Disconnecting . 2016.10.06 18:19:52 - Management - Send 'signal SIGTERM' . 2016.10.06 18:19:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.06 18:19:52 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:19:57 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Element nicht gefunden. . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:19:57 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:19:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:19:57 - OpenVPN > Closing TUN/TAP interface . 2016.10.06 18:19:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.06 18:19:57 - Connection terminated. I 2016.10.06 18:19:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) I 2016.10.06 18:19:57 - DNS leak protection with packet filtering disabled. I 2016.10.06 18:20:00 - Checking authorization ... ! 2016.10.06 18:20:00 - Connecting to Gienah (Netherlands, Alblasserdam) . 2016.10.06 18:20:00 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:20:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:20:00 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:20:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 18:20:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 18:20:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 18:20:00 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 18:20:00 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.95:53 . 2016.10.06 18:20:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.95:53, sid=de2d5383 0a0313f2 . 2016.10.06 18:20:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 18:20:00 - OpenVPN > Validating certificate key usage . 2016.10.06 18:20:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 18:20:00 - OpenVPN > VERIFY KU OK . 2016.10.06 18:20:00 - OpenVPN > Validating certificate extended key usage . 2016.10.06 18:20:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 18:20:00 - OpenVPN > VERIFY EKU OK . 2016.10.06 18:20:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 18:20:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:20:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:20:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 18:20:01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.95:53 . 2016.10.06 18:20:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 18:20:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.8 255.255.0.0' . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 18:20:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 18:20:03 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 18:20:03 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 18:20:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 18:20:03 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 18:20:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.8/255.255.0.0 [SUCCEEDED] . 2016.10.06 18:20:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.8/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.8.255.254, lease-time: 31536000] . 2016.10.06 18:20:03 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 18:20:06 - Systems & servers data update completed . 2016.10.06 18:20:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - Starting Management Interface . 2016.10.06 18:20:08 - OpenVPN > Initialization Sequence Completed I 2016.10.06 18:20:08 - DNS leak protection with packet filtering enabled. I 2016.10.06 18:20:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1) I 2016.10.06 18:20:08 - Flushing DNS I 2016.10.06 18:20:08 - Checking route I 2016.10.06 18:20:09 - Checking DNS ! 2016.10.06 18:20:09 - Connected. . 2016.10.06 18:20:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 18:20:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1483 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1733 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1734 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1939 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1940 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2282 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:24:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #14928 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:26:26 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #23716 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:30:17 - Updating systems & servers data ... . 2016.10.06 18:30:17 - Systems & servers data update completed . 2016.10.06 18:40:20 - Updating systems & servers data ... . 2016.10.06 18:40:54 - Systems & servers data update completed
  4. Hello fellow AirVPN users, Here is my issue that I'm experiencing with AirVPN: Problem: I'm experiencing issues with IPv4 and IPv6 connectivity on my Windows 10 machine. I started experiencing this shortly after installing the AirVPN client. I mainly use this machine on one of two WiFi networks (home and work) and the issue behaves differently on each network. Work Network: On my work network, "No Network Access" is displayed for both IPv4 and IPv6 connectivity on my WiFi status dialog box. I cannot make any sort of internet connection on any application on this network nor can I log-in or connect to AirVPN. I also see a yellow triangle over my WiFi icon on my Windows notifications taskbar. Home Network: After restarting/rebooting/booting/waking the computer, the WiFi status lists "No Network Access" for both IPv4 & 6 connectivity. However, when I try to log-in and start an AirVPN server connection through the client, the IPv4 connectivity status changes to "Internet" while the IPv6 connection remains on "No Network Access." The yellow triangle disappears over my taskbar WiFi icon and I'm able to connect to the internet with my browser. My IP address seems to be properly displayed as my AirVPN server's IP and no DNS leak is detected by dnsleaktest.com. However, I used to have IPv6 connectivity on this network prior to installing AirVPN client on this machine. If I disconnect and close AirVPN, the IPv4 connection remains on. Attempted Solutions: 1. Disabled network lock 2. Ran Windows Network Diagnosis: stated that machine seems to be configured correctly yet DNS connectivity cannot be obtained. 3. Ran a series of "netsh int tcp set..." commands based on the instructions at this website. No success. Any help would be appreciated. AirVPN works well on my Linux machines but it's critical that I'm able to use it on this Windows machine. Thanks!!
  5. So, I have been having an ongoing issue for about month now when disconnected from AirVPN my Ethernet connection is lost and under "Network Connections" says Unidentified Network . I've read quite a bit on these forums to fix similar issues, but nothing seems to work for me. So at first it started out where when I was NOT connected to airvpn I'd lose connection and get DNS errors in Chrome. The pretty common DNS server fix where using the "netsh interface IPv4 set dnsserver Ethernet dhcp" cmd would easily correct it. Well then somehow it just stopped working. So I read how reinstalling AirVPN fixed this for a lot of people, I tried that and the issue still persists. I also read how making sure that the IPv4 DNS properties was set to "Obtain DNS server address automatically" and that also does nothing. I've made sure the network lock feature is also not on as when launching AirVPN the option says "activate" The only fix is rebooting my router which is super annoying. Please help. I apologize in advance that I know the bare minimum when it comes to networking.
  6. History of my use with AirVPN: https://airvpn.org/topic/17299-speed-goes-to-0-then-disconnects/ Hello, I am going to try and provide as much useful information as possible with my issue and the steps taken to try and resolve this on my own. Ever since I have updated to the Windows 10 anniversary edition my AirVPN client will be connected for 30 mins and then will disconnect. It will fail to reconnect during many attempts. I will need to close AirVPN and reboot my system for it to work again (but after 30/40 mins the same will happen). As a result of this I am forced to browse the web without my vpn. I followed the steps listed here : https://airvpn.org/topic/16573-tap-driver-9210-causing-a-myriad-of-issues/?p=46207 about changing the Media Status of the TAP network adapter to Always connected. I also tried downgrading and upgrading the TAP driver but neither seem to solve the issue. I believe it's a result of the anniversary update as it was working perfectly before. This evening I have formatted my system and done a fresh install of Windows 10 1607 and the same is still occurring. System Information AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 When it disconnects . 2016.08.23 21:49:39 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2016.08.23 21:49:39 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2016.08.23 21:49:39 - OpenVPN > Restart pause, 2 second(s) ! 2016.08.23 21:49:39 - Disconnecting . 2016.08.23 21:49:39 - Management - Send 'signal SIGTERM' . 2016.08.23 21:49:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.08.23 21:49:39 - OpenVPN > MANAGEMENT: Client disconnected . 2016.08.23 21:49:39 - OpenVPN > Assertion failed at misc.c:779 . 2016.08.23 21:49:39 - OpenVPN > Exiting due to fatal error . 2016.08.23 21:49:39 - Connection terminated. Please let me know if anything else is needed. Annovpn
  7. New member for about a week. I downloaded AirVPN client app for Win10 and cannot connect to any server. I connect to internet through Asus 88U router LAN wired. Please help.
  8. if you have amd apu probally in panel control you have installed "amd quick stream", UNINSTALL it, or in alternative uncheck "appex accelerator" in "TAP-Windows Adapter V9 - properties", they cause constant disconnection. Hope this help
  9. This might be covered elsewhere but I can't find it with search so I thought I'd ask. It takes a little while for Windows 10 to connect to a network (wired, in this case) after waking, but Eddie (v2.10.3) starts trying to re-connect before the network is actually up. In most cases this causes it to start connecting, fail, then re-connect, which seems like a waste of time. And since it takes longer to cancel the connection than to just let it try it's usually faster to just let it go. As well, if "Force reconnection to last server" is not checked it will sometimes connect to some random server that's nowhere near the fastest as the server list seems not to be updated for speed (no stars next to any servers and they'll be in a different, seemingly random order). Also, I'm not sure if this is related but if network lock is enabled it sometimes seems to trigger a loop wherein AirVPN can't connect/retries/fails/retries/etc. and I have to kill AirVPN, go into the adapter settings and turn DNS back to auto, re-open AirVPN and re-connect. Is there a way to make Eddie wait a few seconds before attempting to connect to ensure the network is up?
  10. My Windows 10 (Pro) did the lovely automatic update last night and now my network lock is disabled. I cannot re-enable it. I am at a loss. I include my version and startup log. Version 10.0 (Build 10240) My Log: I 2016.04.24 10:31:46 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.04.24 10:31:46 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.04.24 10:31:47 - Data Path: C:\Program Files\AirVPN. 2016.04.24 10:31:47 - App Path: C:\Program Files\AirVPN. 2016.04.24 10:31:47 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.04.24 10:31:47 - Command line arguments (0):. 2016.04.24 10:31:47 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.04.24 10:31:47 - Updating systems & servers data .... 2016.04.24 10:31:48 - Systems & servers data update completedI 2016.04.24 10:31:53 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.04.24 10:31:53 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.04.24 10:31:53 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.04.24 10:31:53 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)W 2016.04.24 10:31:53 - Recovery. Unexpected crash?I 2016.04.24 10:31:53 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.04.24 10:31:53 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection)I 2016.04.24 10:31:53 - IPv6 restored.! 2016.04.24 10:31:54 - Deactivation of Network Lock! 2016.04.24 10:31:58 - ReadyI 2016.04.24 10:33:31 - Session starting.I 2016.04.24 10:33:31 - IPv6 disabled.I 2016.04.24 10:33:31 - Checking authorization ...! 2016.04.24 10:33:32 - Connecting to Yildun (United States, Miami). 2016.04.24 10:33:33 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.24 10:33:33 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.24 10:33:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.24 10:33:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.24 10:33:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.24 10:33:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.24 10:33:33 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.04.24 10:33:33 - OpenVPN > UDPv4 link local: [undef]. 2016.04.24 10:33:33 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443. 2016.04.24 10:33:33 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2742221b 928ca543. 2016.04.24 10:33:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.24 10:33:33 - OpenVPN > Validating certificate key usage. 2016.04.24 10:33:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.24 10:33:33 - OpenVPN > VERIFY KU OK. 2016.04.24 10:33:33 - OpenVPN > Validating certificate extended key usage. 2016.04.24 10:33:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.24 10:33:33 - OpenVPN > VERIFY EKU OK. 2016.04.24 10:33:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.24 10:33:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.24 10:33:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.24 10:33:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.24 10:33:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.24 10:33:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.24 10:33:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443. 2016.04.24 10:33:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.24 10:33:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.38.225 255.255.0.0'. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.24 10:33:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.24 10:33:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.24 10:33:37 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.24 10:33:37 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{914A6F59-21CD-4943-86E2-0E5B3711A9ED}.tap. 2016.04.24 10:33:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.04.24 10:33:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.225/255.255.0.0 [sUCCEEDED]. 2016.04.24 10:33:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.225/255.255.0.0 on interface {914A6F59-21CD-4943-86E2-0E5B3711A9ED} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.24 10:33:37 - OpenVPN > Successful ARP Flush on interface [6] {914A6F59-21CD-4943-86E2-0E5B3711A9ED}. 2016.04.24 10:33:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.24 10:33:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.04.24 10:33:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.04.24 10:33:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.24 10:33:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 7. 2016.04.24 10:33:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.04.24 10:33:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.24 10:33:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.24 10:33:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.04.24 10:33:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.24 10:33:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.24 10:33:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.04.24 10:33:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.24 10:33:42 - Starting Management Interface. 2016.04.24 10:33:42 - OpenVPN > Initialization Sequence CompletedI 2016.04.24 10:33:42 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.24 10:33:42 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection)I 2016.04.24 10:33:42 - Flushing DNSI 2016.04.24 10:33:42 - Checking routeI 2016.04.24 10:33:56 - Checking DNS! 2016.04.24 10:33:57 - Connected.. 2016.04.24 10:33:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.24 10:33:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  11. Hello, I have been using AirVPN for about 4 months. Working fine. I had to recently format my main computer (due to graphics issue which is not relevant to this but the reason for wiping system). On the new build I have installed Bullguard Internet Security with firewall disabled. AirVPN connects automatically on start-up to windows and seems to be fine for 20/30 mins. then all of a sudden the speed will go to 0 up /0 down. It will be like this for a minute or two and then finally disconnect. It will also fail to reconnect which is a second problem. Most times I will need to restart the computer. Useful Info AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 Log when error occurs . 2016.04.04 17:18:56 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2016.04.04 17:18:56 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2016.04.04 17:18:56 - OpenVPN > Restart pause, 2 second(s) ! 2016.04.04 17:18:56 - Disconnecting . 2016.04.04 17:18:56 - Management - Send 'signal SIGTERM' . 2016.04.04 17:18:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.04 17:18:56 - OpenVPN > MANAGEMENT: Client disconnected . 2016.04.04 17:18:56 - OpenVPN > Assertion failed at misc.c:779 . 2016.04.04 17:18:56 - OpenVPN > Exiting due to fatal error . 2016.04.04 17:18:56 - Connection terminated. I 2016.04.04 17:19:45 - Checking authorization ... W 2016.04.04 17:20:25 - Authorization check failed, continue anyway ({1]) ! 2016.04.04 17:20:25 - Connecting to Zibal (Netherlands, Alblasserdam) ! 2016.04.04 17:21:03 - Disconnecting . 2016.04.04 17:21:03 - Connection terminated. I 2016.04.04 17:21:06 - Checking authorization .. Thank you, Anon
  12. I recently updated the AirVPN client due to incompatibility with a windows 10 update and am now caught in a 'Checking DNS' loop. I have tried checking firewall, restarted DHCP client and resetting WINSOCK as instructed but no success. Has anyone had a similar issue that they resolved? Thanks logs are as follows: I 2016.04.22 07:44:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.22 07:44:27 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml . 2016.04.22 07:44:28 - Data Path: C:\Users\user\AppData\Local\AirVPN . 2016.04.22 07:44:28 - App Path: C:\Program Files\AirVPN . 2016.04.22 07:44:28 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.22 07:44:28 - Command line arguments (1): path="home" . 2016.04.22 07:44:28 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.22 07:44:28 - Updating systems & servers data ... I 2016.04.22 07:44:30 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.04.22 07:44:30 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.22 07:44:30 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.22 07:44:30 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.04.22 07:44:30 - Activation of Network Lock - Windows Firewall . 2016.04.22 07:44:31 - Systems & servers data update completed ! 2016.04.22 07:44:34 - Ready I 2016.04.22 07:44:42 - Checking login ... ! 2016.04.22 07:44:43 - Logged in. I 2016.04.22 07:44:45 - Session starting. I 2016.04.22 07:44:45 - IPv6 disabled. I 2016.04.22 07:44:47 - Checking authorization ... ! 2016.04.22 07:44:48 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:44:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:44:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:44:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:44:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:44:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:49 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=244fb12e d44b9f1a . 2016.04.22 07:44:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:44:50 - OpenVPN > Validating certificate key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:44:50 - OpenVPN > VERIFY KU OK . 2016.04.22 07:44:50 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:44:50 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:44:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:44:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:44:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:44:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:44:56 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:44:56 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:44:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:44:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:44:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:44:56 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:45:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - Starting Management Interface . 2016.04.22 07:45:02 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:45:02 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:45:02 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:45:02 - Flushing DNS I 2016.04.22 07:45:03 - Checking DNS W 2016.04.22 07:46:07 - The operation has timed out ! 2016.04.22 07:46:07 - Disconnecting . 2016.04.22 07:46:07 - Management - Send 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:46:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:46:07 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:46:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:46:13 - Connection terminated. I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:16 - Checking authorization ... ! 2016.04.22 07:46:17 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:46:17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:46:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:46:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:46:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=31b5a96e f1c388b8 . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:46:21 - OpenVPN > Validating certificate key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:46:21 - OpenVPN > VERIFY KU OK . 2016.04.22 07:46:21 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:46:21 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:46:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:46:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:46:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:46:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:46:36 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:46:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:46:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:46:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:46:36 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:46:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - Starting Management Interface . 2016.04.22 07:46:41 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:46:41 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:46:41 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:41 - Flushing DNS I 2016.04.22 07:46:41 - Checking DNS W 2016.04.22 07:47:44 - The operation has timed out ! 2016.04.22 07:47:45 - Disconnecting . 2016.04.22 07:47:45 - Management - Send 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:47:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:47:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:47:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:47:51 - Connection terminated. I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:47:54 - Checking authorization ... ! 2016.04.22 07:47:55 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:47:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:47:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:47:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:47:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:47:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:47:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=9735c095 a359c91b . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:47:56 - OpenVPN > Validating certificate key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:47:56 - OpenVPN > VERIFY KU OK . 2016.04.22 07:47:56 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:47:56 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:48:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:48:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:48:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:48:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:48:04 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:48:04 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:48:04 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:48:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:48:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:48:04 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:48:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - Starting Management Interface . 2016.04.22 07:48:10 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:48:10 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:48:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:48:10 - Flushing DNS I 2016.04.22 07:48:10 - Checking DNS W 2016.04.22 07:49:13 - The operation has timed out ! 2016.04.22 07:49:14 - Disconnecting . 2016.04.22 07:49:14 - Management - Send 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:49:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:49:14 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:49:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:49:19 - Connection terminated. I 2016.04.22 07:49:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:49:20 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:23 - Checking authorization ... ! 2016.04.22 07:49:24 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:49:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:49:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:49:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:49:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:49:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:25 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=4be6c1cd e79de183 . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:49:25 - OpenVPN > Validating certificate key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:49:25 - OpenVPN > VERIFY KU OK . 2016.04.22 07:49:25 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:49:25 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:49:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:49:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:49:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:49:29 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:49:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:49:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:49:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:49:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:49:30 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:49:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - Starting Management Interface . 2016.04.22 07:49:35 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:49:36 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:49:36 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:36 - Flushing DNS I 2016.04.22 07:49:36 - Checking DNS W 2016.04.22 07:50:41 - The operation has timed out ! 2016.04.22 07:50:41 - Disconnecting . 2016.04.22 07:50:41 - Management - Send 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:50:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:50:41 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:50:47 - Connection terminated. I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:50:50 - Checking authorization ... ! 2016.04.22 07:50:51 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:50:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:50:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:50:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:50:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:50:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:50:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=493fb40b 5f7da64a . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:50:52 - OpenVPN > Validating certificate key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:50:52 - OpenVPN > VERIFY KU OK . 2016.04.22 07:50:52 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:50:52 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:50:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:51:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:51:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:51:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:51:02 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:51:02 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:51:02 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:51:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:51:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:51:02 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:51:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - Starting Management Interface . 2016.04.22 07:51:07 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:51:07 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:51:07 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:51:07 - Flushing DNS I 2016.04.22 07:51:07 - Checking DNS W 2016.04.22 07:52:11 - The operation has timed out ! 2016.04.22 07:52:11 - Disconnecting . 2016.04.22 07:52:11 - Management - Send 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:52:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:52:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:52:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:52:17 - Connection terminated. I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:20 - Checking authorization ... ! 2016.04.22 07:52:21 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:52:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:52:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:52:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:52:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:52:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=7d716aea b0e65614 . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:52:22 - OpenVPN > Validating certificate key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:52:22 - OpenVPN > VERIFY KU OK . 2016.04.22 07:52:22 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:52:22 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:52:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:52:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:52:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:52:27 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:52:27 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:52:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:52:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:52:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:52:27 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:52:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - Starting Management Interface . 2016.04.22 07:52:32 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:52:32 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:52:32 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:32 - Flushing DNS I 2016.04.22 07:52:33 - Checking DNS W 2016.04.22 07:53:36 - The operation has timed out ! 2016.04.22 07:53:36 - Disconnecting . 2016.04.22 07:53:36 - Management - Send 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:53:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:53:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:53:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:53:41 - Connection terminated. I 2016.04.22 07:53:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:53:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:53:46 - Checking authorization ... ! 2016.04.22 07:53:47 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:53:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:53:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:53:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:53:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:53:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:48 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=10161db4 82e9b416 . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:53:48 - OpenVPN > Validating certificate key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:53:48 - OpenVPN > VERIFY KU OK . 2016.04.22 07:53:48 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:53:48 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:53:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:53:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:53:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:53:58 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:53:58 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:53:58 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:53:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:53:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:53:58 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:54:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - Starting Management Interface . 2016.04.22 07:54:03 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:54:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:54:03 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:54:03 - Flushing DNS I 2016.04.22 07:54:03 - Checking DNS W 2016.04.22 07:55:07 - The operation has timed out ! 2016.04.22 07:55:08 - Disconnecting . 2016.04.22 07:55:08 - Management - Send 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:55:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:55:13 - Connection terminated. I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:17 - Checking authorization ... ! 2016.04.22 07:55:18 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:55:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:55:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:55:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:55:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:55:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:18 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=036bc46f f31831eb . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:55:19 - OpenVPN > Validating certificate key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:55:19 - OpenVPN > VERIFY KU OK . 2016.04.22 07:55:19 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:55:19 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:55:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:55:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:55:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:55:23 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:55:23 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:55:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:55:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:55:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:55:23 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:55:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - Starting Management Interface . 2016.04.22 07:55:28 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:55:28 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:55:28 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:28 - Flushing DNS I 2016.04.22 07:55:28 - Checking DNS W 2016.04.22 07:56:31 - The operation has timed out ! 2016.04.22 07:56:31 - Disconnecting . 2016.04.22 07:56:31 - Management - Send 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:56:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:56:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:56:36 - Connection terminated. I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:56:36 - Cancel requested. I 2016.04.22 07:56:36 - IPv6 restored. ! 2016.04.22 07:56:37 - Session terminated. ! 2016.04.22 07:56:39 - Deactivation of Network Lock
  13. Hello, I've recently buy an account and it works great but i can't connect without the app. It's very disturbing if i want to connect to a restricted wi-fi or on a slow connection. I've tried to uninstall it but it doesn't work. i will try to uninstall and Ccleaner or search how to make it work more longer than i did but it still a problem to solve. SFMBE (Sorry For My Bad English), i'm not a native speaker. Thanks in advance
  14. I had problems with my ISP:s DNS servers showing up on DNS leak tests. It seems that this is a Windows 10 related problem and is fixed in OpenVPN 2.3.9 when using the --block-outside-dns configuration option. I managed to fix leaks by switching to OpenVPN-GUI-client and adding block-outside-dns to the AirVPN configuration file. It might also be possible to use the plugin in Eddie's OpenVPN-version. I haven't tested this because I'm happy with the OpenVPN-GUI for now. The plugin can be found from here: https://github.com/ValdikSS/openvpn-fix-dns-leak-plugin Hopefully this is helpful for someone.
  15. Hello there, New here. 1. I've just tested your AirVPN for Windows on a Windows 10 Pro 64-bit. I had to create an AirVPN shortcut manually after the default install: head to AirVPN's install folder (C:\Program Files) > find the main application > right click > send... it's just bit time-consuming... 2. Your development department can consider enabling a pop-up that requests the user to install the .net 3.5 manually. Or you can offer the URL for an offline installer of .net 3.5 at your official download page instead. Kind regards Bry, your new aff. member.
  16. Hi, Just changed to Windows 10 and am having constant disconnection and restart making it impossible to use the client. I installed the Windows 10 version of Eddie 2.10 and at first everything was fine but on the second day since Windows 10 the disconnect restart problem started. I looked at several forum post about this but most of it was too technical or advanced and went way over my head. I did try changing Protocols from Automatic to UDP Port 443 and TCP Port 443 which worked for one forum poster but not for me. I have forwarded port 60087 on TCP & UCP (again, I don't really know if this affects anything) and have attached a copy of the session log. I hope someone can help me as this is driving me crazy! AirVPN_20160109_143040.txt
  17. I've been using AirVPN happily on two Windows 10 devices for a few weeks. In the last week or so, I've started to see an issue where, when connected to an AirVPN server, I'll intermittently lose all internet access. This seems to happen every 10 minutes or so. What's weird is that the AirVPN client still shows as green and even shows some network activity, but all website traffic (in any browser), Twitter, etc. are completely down. Eventually it will just start working like nothing ever happened. There are no log entries during this period in AirVPN. When it's not working, troubleshooting the Windows network connection shows an error that "Windows cannot automatically detect proxy settings." I don't have any proxy set up either in Windows or in the browsers. Any thoughts on what might be happening here?
  18. Hello, I used OpenVPN on my 2 pc (both WIndows 10) and since 2 weeks my client won't work on my desktop pc. I have to do the stuff i want on my crappy laptop. The air vpn client start but won't connect to a server. It already did this on my laptop but it stopped mysteriously Thanks in advance and SFMBE (Sorry For My Bad English).
  19. I have used WIndows 10 on a previous laptop and had a lot of problems with this vpn client. When it did connect to a server, any website I went to it would act like it couldnt connect. Things like downloading a torrent would be no problem, just doing 2 things at once, wasn't gonna happen.So i went back to 8.1 with no issues. Recenetly got a new laptop with windows 10 installed :/ and my guess it's gonna act up the same way as before. So, is this a known issue with airvpn or is it just the mess that is called Windows 10?? If this doesn't work I figure i can downgrade to 8.1(maybe?) without destroying my recovery partition on my dell.Very frustrating! I have read somewhere that Windows 10 has issues with creating the 1 - 2 tunnels needed when using a vpn client with openvpn.Idk.Maybe someone knows more about this than i do. Gonna install the airvpn client again and hope it works.Any help would be appreciated.thanks
  20. Hi, I got yesterday a 3-day subscription to AirVPN for testing (before bying a longer subscription) but I can't make it work. The main symptom is the extremely low speeds. My PC (Windows 7 64bit Prof) is on a Gigabit line. My normal speeds, according to speedtest.net, are around 500-600mbps (down and up). With AirVPN connected, my speed usually gets lower than 10mbps! Sometimes I get good speeds (60-100mbps) but as soon as I start uTorrent, the connection stalls to the point even DNS resolving fails. Something I noticed: the TAP adapter always says "Unintedified network" and, according to ipconfig its "Default Gateway" is empty. Is that normal? I have tried both OpenVPN and the AirVPN app. in both cases the logs are clean (no errors or warnings) but the problem persists. Also I tried uninstalling everything relevant (even the TAP adapter) and reinstalling but nothing changed. I know my ISP is ok with OpenVPN. They use it for some of their services too. So, any ideas on how to resolve this mess? Or at least how to get some usable debbuging info? Thanks!
  21. Hey, Im having slow speed on any vpn server, halp. I changed already the buffer to 256kb but it didnt helped. I upgraded to win 10 and since then Im having this problem.
  22. Hello, I am having a problem with email when AirVPN is running. I use the Windows 10 email app for two accounts with different services, one of which is a Yahoo mail account. The non-Yahoo account works fine. However, the with AirVPN running, the Yahoo mail does not download or sync. If I turn off AirVPN (and along with it the Network Lock) then the Yahoo account does work. So, for some reason AirVPN seems to be blocking the Yahoo mail but not other email accounts. Does anyone have any experience with this, or ideas what may be the cause and how to correct it? Thank-you.
  23. So it looks like since Upgrading to Windows 10 - the Network Lock is no longer working. I am still able to connect to the internet while not connected to a VPN server. I get notifications when activating and deactivating the feature; however I am not 100% sure this is working correctly. I didn't download any AirVPN update after my upgrade - as it looked like AirVPN was working fine already. Has anyone else experienced this same problem?
  24. I've been having a very odd problem with AirVPN, and this issue seems to be present in both the AirVPN client as well as Viscosity (OpenVPN). I can connect just fine, with no issues at all. However, after a few minutes my donnection drastically slows and becomes non-responsive. In order to get my connection working again I'll need to restart because the adapter is unresposive as well. Here is some of the log file from the airvpn client. I eliminated repetative entries. ​ I am experiencing the same issue in both the stable and expieremental builds. As I said I am also having the same problem using OpenVPN; I can connect fine and in fact I get great speeds at first. Then my connection slows and eventually is non responsive. ​ ​ Any ideas? Could this be triggered by torrenting? Thanks. ​ ​
  25. I have a desktop running 8.1, and it connects to AirVPN servers just fine. I have two laptops running Win 10 and neither will successfully connect using Eddie. I have tested the Amahi VPN client (which is a wrapper for OpenVPN, like Eddie) so I don't think it's an incompatibility between OpenVPN and Windows 10. Any suggestions? Which Logs would you like to see?
×
×
  • Create New...