Jump to content
Not connected, Your IP: 3.88.16.192

Search the Community

Showing results for tags 'dns'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 189 results

  1. When VPN connected from San Francisco area via Comcast ISP to Germany IPLeak.net in Chrome browser shows the following: IP 213.152.162.84 WebRTC 213.152.162.84 DNS Addr Det. US 162.242.211.137 Germany 78.46.223.24 I was surprised to see a US DNS address. With NSLookup 162.242.211.137 showed as a non-existent domain trying to resolve with OpenDNS in my home NAT router. But I can ping that IP address. In the Chrome browser I am using the WebRTC Leak Prevent addon. I think WebRTC is ok since it only shows my IP address in Germany.
  2. I've recently started using AirVPN. I am connecting to AirVPN with a pfSense router (v2.3 using the DNS resolver). The problem I'm having is an intermittent failure to resolve www.airvpn.org from any device on the network. airvpn.org seems to be the only site impacted. When I try to go to the AirVPN site it will timeout. If I wait a minute or so, I am able to successfully load the AirVPN site. The next time I tried to go to the site, it times out again....wait a minute than I can get in again. This occurs over and over again. When the site won't load, nslookup fails, but a DNS query from the pfSense box succeeds, showing a response from the AirVPN DNS server. My pfSense is setup with two VLANS - one VLAN directing traffic to AirVPN and another VLAN that routes traffic out the standard WAN port (using OpenDNS DNS servers). This problem only happens on the VPN VLAN, using the other (non-VPN) VLAN works correctly. All of this makes me think the problem is somewhere in the pfSense configuration, but the fact that it only impacts airvpn.org when using the AirVPN DNS server makes me think I should start here. I've tried several different servers (Metallah, Rasalas, Pollux, Azha, Acamar, Zosma) with no change in the issue. If I try to go to the site using the IP address returned by nslookup I get a browser warning "Your connection is not secure". To connect I have to create a security exception in the browser. I don't get this error when I am able to browse the site using the name instead of the IP. If it matters, I'm using pfBlockerNG on the pfSense box, but I have this problem even when pfBlockerNG is disabled or even uninstalled. Has anyone ever seen this behavior or have any ideas how to resolve it?
  3. hi whenever i tried to access bbc iplayer it detects DNS and prohibit the access .can anyone explain
  4. Hi, My internet does not work when I log off or turn off AirVPN. The reason for this is the DNS settings don't get reset to automatic. Every time I log off, I have to go to IPV4 settings, and change the DNS settings to automatic from the address inserted by AirVPN. This is happening on both my Windows 10 laptop / Windows 8.1 Desktop. Strangely, its 100% of the time on laptop and periodically on my desktop. I have "Network Lock" mode set to none. Also turned off his Activate Network Lock at Startup, and the DNS Switch Mode set to automatic. Any help?
  5. Hello, it seems there might be a DNS issue on the new Atria server. Can someone verify this?
  6. I recently updated the AirVPN client due to incompatibility with a windows 10 update and am now caught in a 'Checking DNS' loop. I have tried checking firewall, restarted DHCP client and resetting WINSOCK as instructed but no success. Has anyone had a similar issue that they resolved? Thanks logs are as follows: I 2016.04.22 07:44:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.22 07:44:27 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml . 2016.04.22 07:44:28 - Data Path: C:\Users\user\AppData\Local\AirVPN . 2016.04.22 07:44:28 - App Path: C:\Program Files\AirVPN . 2016.04.22 07:44:28 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.22 07:44:28 - Command line arguments (1): path="home" . 2016.04.22 07:44:28 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.22 07:44:28 - Updating systems & servers data ... I 2016.04.22 07:44:30 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.04.22 07:44:30 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.22 07:44:30 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.22 07:44:30 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.04.22 07:44:30 - Activation of Network Lock - Windows Firewall . 2016.04.22 07:44:31 - Systems & servers data update completed ! 2016.04.22 07:44:34 - Ready I 2016.04.22 07:44:42 - Checking login ... ! 2016.04.22 07:44:43 - Logged in. I 2016.04.22 07:44:45 - Session starting. I 2016.04.22 07:44:45 - IPv6 disabled. I 2016.04.22 07:44:47 - Checking authorization ... ! 2016.04.22 07:44:48 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:44:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:44:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:44:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:44:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:44:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:44:49 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:49 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=244fb12e d44b9f1a . 2016.04.22 07:44:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:44:50 - OpenVPN > Validating certificate key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:44:50 - OpenVPN > VERIFY KU OK . 2016.04.22 07:44:50 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:44:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:44:50 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:44:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:44:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:44:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:44:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:44:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:44:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:44:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:44:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:44:56 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:44:56 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:44:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:44:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:44:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:44:56 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:45:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:45:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:45:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:45:02 - Starting Management Interface . 2016.04.22 07:45:02 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:45:02 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:45:02 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:45:02 - Flushing DNS I 2016.04.22 07:45:03 - Checking DNS W 2016.04.22 07:46:07 - The operation has timed out ! 2016.04.22 07:46:07 - Disconnecting . 2016.04.22 07:46:07 - Management - Send 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:46:07 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:46:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:46:07 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:46:12 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:46:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:46:13 - Connection terminated. I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:46:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:16 - Checking authorization ... ! 2016.04.22 07:46:17 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:46:17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:46:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:46:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:46:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:46:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=31b5a96e f1c388b8 . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:46:21 - OpenVPN > Validating certificate key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:46:21 - OpenVPN > VERIFY KU OK . 2016.04.22 07:46:21 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:46:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:46:21 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:46:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:46:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:46:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:46:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:46:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:46:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:46:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:46:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:46:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:46:36 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:46:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:46:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:46:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:46:36 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:46:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:46:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:46:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:46:41 - Starting Management Interface . 2016.04.22 07:46:41 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:46:41 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:46:41 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:46:41 - Flushing DNS I 2016.04.22 07:46:41 - Checking DNS W 2016.04.22 07:47:44 - The operation has timed out ! 2016.04.22 07:47:45 - Disconnecting . 2016.04.22 07:47:45 - Management - Send 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:47:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:47:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:47:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:47:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:47:50 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:47:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:47:51 - Connection terminated. I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:47:51 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:47:54 - Checking authorization ... ! 2016.04.22 07:47:55 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:47:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:47:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:47:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:47:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:47:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:47:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:47:56 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:47:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=9735c095 a359c91b . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:47:56 - OpenVPN > Validating certificate key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:47:56 - OpenVPN > VERIFY KU OK . 2016.04.22 07:47:56 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:47:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:47:56 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:47:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:48:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:48:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:48:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:48:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:48:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:48:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:48:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:48:04 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:48:04 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:48:04 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:48:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:48:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:48:04 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:48:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:48:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:48:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:48:10 - Starting Management Interface . 2016.04.22 07:48:10 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:48:10 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:48:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:48:10 - Flushing DNS I 2016.04.22 07:48:10 - Checking DNS W 2016.04.22 07:49:13 - The operation has timed out ! 2016.04.22 07:49:14 - Disconnecting . 2016.04.22 07:49:14 - Management - Send 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:49:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:49:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:49:14 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:49:19 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:49:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:49:19 - Connection terminated. I 2016.04.22 07:49:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:49:20 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:23 - Checking authorization ... ! 2016.04.22 07:49:24 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:49:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:49:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:49:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:49:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:49:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:49:24 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:25 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=4be6c1cd e79de183 . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:49:25 - OpenVPN > Validating certificate key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:49:25 - OpenVPN > VERIFY KU OK . 2016.04.22 07:49:25 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:49:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:49:25 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:49:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:49:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:49:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:49:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:49:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:49:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:49:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:49:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:49:29 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:49:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:49:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:49:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:49:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:49:30 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:49:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:49:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:49:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:49:35 - Starting Management Interface . 2016.04.22 07:49:35 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:49:36 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:49:36 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:49:36 - Flushing DNS I 2016.04.22 07:49:36 - Checking DNS W 2016.04.22 07:50:41 - The operation has timed out ! 2016.04.22 07:50:41 - Disconnecting . 2016.04.22 07:50:41 - Management - Send 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:50:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:50:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:50:41 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:50:47 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:50:47 - Connection terminated. I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:50:47 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:50:50 - Checking authorization ... ! 2016.04.22 07:50:51 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:50:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:50:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:50:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:50:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:50:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:50:52 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:50:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=493fb40b 5f7da64a . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:50:52 - OpenVPN > Validating certificate key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:50:52 - OpenVPN > VERIFY KU OK . 2016.04.22 07:50:52 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:50:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:50:52 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:50:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:50:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:50:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:50:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:51:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:51:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:51:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:51:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:51:02 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:51:02 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:51:02 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:51:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:51:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:51:02 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:51:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:51:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:51:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:51:07 - Starting Management Interface . 2016.04.22 07:51:07 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:51:07 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:51:07 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:51:07 - Flushing DNS I 2016.04.22 07:51:07 - Checking DNS W 2016.04.22 07:52:11 - The operation has timed out ! 2016.04.22 07:52:11 - Disconnecting . 2016.04.22 07:52:11 - Management - Send 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:52:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:52:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:52:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:52:17 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:52:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:52:17 - Connection terminated. I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:52:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:20 - Checking authorization ... ! 2016.04.22 07:52:21 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:52:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:52:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:52:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:52:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:52:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:52:22 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=7d716aea b0e65614 . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:52:22 - OpenVPN > Validating certificate key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:52:22 - OpenVPN > VERIFY KU OK . 2016.04.22 07:52:22 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:52:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:52:22 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:52:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:52:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:52:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:52:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:52:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:52:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:52:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:52:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:52:27 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:52:27 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:52:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:52:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:52:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:52:27 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:52:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:52:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:52:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:52:32 - Starting Management Interface . 2016.04.22 07:52:32 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:52:32 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:52:32 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:52:32 - Flushing DNS I 2016.04.22 07:52:33 - Checking DNS W 2016.04.22 07:53:36 - The operation has timed out ! 2016.04.22 07:53:36 - Disconnecting . 2016.04.22 07:53:36 - Management - Send 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:53:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:53:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:53:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:53:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:53:41 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:53:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:53:41 - Connection terminated. I 2016.04.22 07:53:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:53:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:53:46 - Checking authorization ... ! 2016.04.22 07:53:47 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:53:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:53:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:53:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:53:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:53:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:53:48 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:48 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=10161db4 82e9b416 . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:53:48 - OpenVPN > Validating certificate key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:53:48 - OpenVPN > VERIFY KU OK . 2016.04.22 07:53:48 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:53:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:53:48 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:53:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:53:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:53:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:53:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:53:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:53:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:53:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:53:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:53:58 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:53:58 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:53:58 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:53:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:53:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:53:58 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:54:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:54:03 - Starting Management Interface . 2016.04.22 07:54:03 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:54:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:54:03 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:54:03 - Flushing DNS I 2016.04.22 07:54:03 - Checking DNS W 2016.04.22 07:55:07 - The operation has timed out ! 2016.04.22 07:55:08 - Disconnecting . 2016.04.22 07:55:08 - Management - Send 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:55:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:55:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:55:13 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:55:13 - Connection terminated. I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:55:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:17 - Checking authorization ... ! 2016.04.22 07:55:18 - Connecting to Gemma (Canada, Vancouver) . 2016.04.22 07:55:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.22 07:55:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.22 07:55:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.22 07:55:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.22 07:55:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link local: [undef] . 2016.04.22 07:55:18 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:18 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=036bc46f f31831eb . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.22 07:55:19 - OpenVPN > Validating certificate key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.22 07:55:19 - OpenVPN > VERIFY KU OK . 2016.04.22 07:55:19 - OpenVPN > Validating certificate extended key usage . 2016.04.22 07:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.22 07:55:19 - OpenVPN > VERIFY EKU OK . 2016.04.22 07:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.22 07:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.22 07:55:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.22 07:55:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443 . 2016.04.22 07:55:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.22 07:55:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.1 255.255.0.0' . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.22 07:55:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.22 07:55:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.22 07:55:23 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.22 07:55:23 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{949DF2DC-2675-421F-ADFD-66C1FBD912A9}.tap . 2016.04.22 07:55:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.22 07:55:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.1/255.255.0.0 [sUCCEEDED] . 2016.04.22 07:55:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.1/255.255.0.0 on interface {949DF2DC-2675-421F-ADFD-66C1FBD912A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.22 07:55:23 - OpenVPN > Successful ARP Flush on interface [8] {949DF2DC-2675-421F-ADFD-66C1FBD912A9} . 2016.04.22 07:55:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:55:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.22 07:55:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.22 07:55:28 - Starting Management Interface . 2016.04.22 07:55:28 - OpenVPN > Initialization Sequence Completed I 2016.04.22 07:55:28 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.22 07:55:28 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.22 07:55:28 - Flushing DNS I 2016.04.22 07:55:28 - Checking DNS W 2016.04.22 07:56:31 - The operation has timed out ! 2016.04.22 07:56:31 - Disconnecting . 2016.04.22 07:56:31 - Management - Send 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.22 07:56:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.22 07:56:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.22 07:56:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.22 07:56:36 - OpenVPN > Closing TUN/TAP interface . 2016.04.22 07:56:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.22 07:56:36 - Connection terminated. I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.22 07:56:36 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.22 07:56:36 - Cancel requested. I 2016.04.22 07:56:36 - IPv6 restored. ! 2016.04.22 07:56:37 - Session terminated. ! 2016.04.22 07:56:39 - Deactivation of Network Lock
  7. Once you have your vpn setup and want to check and verify how well it is working what is the best site to visit to verify no dns leak and the ip address?
  8. Greetings - I am having slow page loads for Https, placing an Amazon order and various user forums. Http is working just fine. Setup: Macintosh OS X, El Capitan, Google Chrome browser, Eddie v 2.10; SSL Tunnel port 443 I have read issues with Safari DNS prefetch and switched to Chrome to test. Only extensions are Adblock Plus and Disconnect. DNS is confirmed at 10.50.0.1 (AirVPN). Various speed tests confirm that things are humming along. I have also tired various MTU settings on my router from 1500 down and nothing seems to help. This issue is even more noticeable on an iPad running OpenVPN UDP, 443. Chrome or Safari. Any ideas to try next? Thanks.
  9. I'm trying to use my preferred DNS server (from OpenDNS) rather than the recommended AirVPN server. I've tried listing the IP addresses under Preferences -> Advanced -> DNS, with DNS Switch mode Disabled or Automatic and with "Check if the tunnel uses AirVPN DNS" selected or deselected. In every case, a connection is established, then immediately disconnected, after which the sequence repeats. How can I successfully use a non-AirVPN DNS server?
  10. I am having a bit of trouble editing the resolv.conf file. Aparently, I cant edit it manually as suggested on the Arch wiki. "To use alternative DNS servers, edit /etc/resolv.conf and add them to the top of the file so they are used first, optionally removing or commenting out already listed servers." https://wiki.archlinux.org/index.php/Resolv.conf Although I can open the file and edit it, I can't save the nameservers I entered. (I am as admin with root privileges.) I thought maybe it was being run by another process so I tried lsattr and nothing was holding it. I even ran chattr -i /etc/resolv.conf just to make sure. Still no avail.
  11. I had problems with my ISP:s DNS servers showing up on DNS leak tests. It seems that this is a Windows 10 related problem and is fixed in OpenVPN 2.3.9 when using the --block-outside-dns configuration option. I managed to fix leaks by switching to OpenVPN-GUI-client and adding block-outside-dns to the AirVPN configuration file. It might also be possible to use the plugin in Eddie's OpenVPN-version. I haven't tested this because I'm happy with the OpenVPN-GUI for now. The plugin can be found from here: https://github.com/ValdikSS/openvpn-fix-dns-leak-plugin Hopefully this is helpful for someone.
  12. Yesterday I was running airvpn over tor with socks5 (vip72). I had no issues, iplocation.net had my location pinned as the location of my socks5 proxy. But today I am running the same setup but iplocation.net still has my location pinned as the location of the airvpn server. ( we'll say airvpn server is somewhere in WA, and socks5 is somewhere in Texas) The only change I have made since yesterday is that I switched my DNS servers to Comodo rather than my ISP. Would this be enough to change the differing results?
  13. Good morning, For starters, I'll say that I am new to your VPN, this is actually my very first paid VPN, and although I have done a lot of research and understand the entire concept there are still a few sticking points that confuse me. With that said, I have really enjoyed the service you provide and the extensive effort your team puts into keeping our internet privacy top priority. Seriously, well done. So up until now, I have not had any issues connecting. I was able to get up and running with no problem and have stayed connected when I've needed to be connected. I woke up this morning and was off the network and Eddie seemed to be frozen. I had to do a force quit and when I restarted it, every time I try to reconnect It stalls on checking route and then disconnects and I can't get on any of the servers. I have OSX with latest OS and latest Eddie. Additionally I'd like to get a bit of help explaining to me DNS and proxy once I get my issue resolved. I understand some of it but I just need a clearer explanation of how I can implement even tighter security using DNS tunneling, port forwarding and proxies. Things I would like to achieve: I'd like to ultimately connect to TOR through the VPN in the most effective way.I'd like to understand the advantages of DNS, tunneling and port forwarding so I can take advantage of its uses.If you could tell me if having OSX, if Eddie is still the better option or should I connect using my own VPN options through my OSI'd like to set up my own personal VPN through my OS so that I can be connected to my Windows Laptop when I need toand could you tell me if with service if we have use of private proxies or does the fact I am on a VPN do a way of needing to use a proxy?Thanks in advance for anything you can help me with and best regards LB
  14. I'm having a rather strange issue. I can connect to AirVPN and surf most sites without issue, but for some reason verizonwireless.com is a complete black hole. During troubleshooting I opened a command prompt and performed an nslookup against the VPN tunnel supplied DNS servers for things like Google without issue. But when I try the same command for verizonwireless.com I get nothing back. Likewise, I can get to the main Verizon website, but when I click on the "Wireless" section it dies again. Very strange. Any known issues at the moment that would explain this?
  15. Hello. I am having a problem connecting to any VPN server. It does not matter my distance from the server. When ever I attempt to connect. I get a "DNS Check Failed" and I get disconnected. Are you guys aware of this issue or do you know a way to fix it?
  16. The resolv-conf-update script uses bash-specific variable substitutions so won't work on my dd-wrt router, firmware v3.0-r28112 so, having followed the Air setup guide, I've made the following changes to action the pushed dns value. - remove the static dns entry for 10.x.0.1 from the Basic setup page. I do have an OpenNIC static dns ip there too. - added the following script to the Admin,Commands,Startup to edit the resolver config file # Ensure client enabled [ `nvram get openvpncl_enable` ] || exit OVPN='/tmp/openvpncl' DNSMQ='/tmp/dnsmasq.conf' echo "#!/bin/sh # Fetch dnsmasq's 'resolv.conf' RSLV=\`sed '/resolv-file/!d ; s/.*=//' $DNSMQ\` # Edit resolver conf - (only works for single pushed dns server) case \$script_type in up) # Get pushed dns from env PDNS=\`set | sed '/foreign_option_.*dhcp-option DNS /!d ; s/.* \([0-9.]*\).*/nameserver \1/'\` sed -i \"1s/^/\$PDNS\n/\" \$RSLV echo \$PDNS >$OVPN/pdns ;; down) PDNS=\`set | cat $OVPN/pdns\` sed -i \"/\$PDNS/d\" \$RSLV ;; esac " > $OVPN/updown.sh # Hack redundant, problem rules sed -i 's/\(.*-I INPUT\)\(.*j \).*/\1 2 \2REJECT/' $OVPN/route-*.sh sed -i 's/\(.*-D INPUT\)\(.*j \).*/\1 \2REJECT/' $OVPN/route-*.sh sed -i '/FORWARD/d' $OVPN/route-*.sh chmod 600 $OVPN/* chmod 700 $OVPN/*.sh killall openvpn ; openvpn --config /tmp/openvpncl/openvpn.conf --route-up /tmp/openvpncl/route-up.sh --down-pre /tmp/openvpncl/route-down.sh --daemon ​ ​ ​ dnsmasq polls its resolver file, resolv.dnsmasq, and acts on changes, so doesn't require any explicit update instructions. ​Note: **added** openvpn restart - there's currently a timing issue (updown.sh isn't created until after the initial start of openvpn, which consequently fails) - add the following directives to the openvpn config up /tmp/openvpncl/updown.sh down /tmp/openvpncl/updown.sh - check it works by visiting ipleak.net or look at /tmp/resolv.dnsmasq on the dd-wrt
  17. Hi, I have some troubles with my internet connection while disconnected from the VPN. As soon as I disconnect from the VPN, every access to any URL gives an adress naming error after a quite long time out. Windows connectivity diagnosis reports a problem with DNS server. Network lock is not activated, I'm using this VPN for one month without problem up to now. I restarted/reseted the box, disabled temporarilly the firewall, no success. I can only access internet from the VPN. There has been no update of any software from the working to not working state. Is there anybody that could drive me to do some test to try to locate where the problem comes from ? Thanks for your help. Laurent
  18. Hi I have read these links and typically, even if I have closed Airvpn and don't have network lock enabled, it still leaves manually assigned DNS entry that then doesn't allow me to browse. Is anyone working to fix this, so that Airvpn is closed, it puts your DNS back to defaults of auto assigned? Thanks
  19. I've been noticing the for last week or so that no matter what server I'm connected to after a little while (say, ~15 minutes sometimes more sometimes less) website look ups will stop working completely. I have changed DNS servers as a test which made no difference. I've tried different browsers and they react the same way - like they're not connected at all. I've even watched the traffic with wireshark and haven't noticed anything unusual (DNS traffic goes out and comes back but browsers still act like they have no connection and it's only web browsers). Changing to another server always fixes the issue but then it comes back again. Outside of the tunnel my connectivity is unaffected. No idea what the problem could be. Is this happening to anyone else?
  20. Hello, I am having trouble connecting to any of my internal computers/servers while connected to AirVPN. All of my requests to my internal FQDN addresses are getting timed out, but connections using plain IP addresses are working fine. Issue is probably with DNS request. I have added my internal IP network ranges to the Routes table in Preferences but attempting to add Routes by hostname or FQDN doesn't work, cannot save my input. How can I configure the AirVPN client to allow me access to my internal computers ? Thank you.
  21. I have a couple of questions regarding port forwarding. One - I saw this line - but it isn't explained in the FAQ page: Watch for warnings from our security check: a red token implies that your anonymity layer may be lowered or broken by a malicious adversary. What does this mean exactly? Where would I find this red token and what exactly could it mean? Also - is there any additional setup required after forwarding a specific port, or will this be automatic whenever connecting through the client? And lastly - for Dynamic DNS - is there a specific naming convention I should be following for this when coming up with a name? Thanks in advance, I know this is several questions. KR
  22. Hi, The question says it all, really, does ipleak.net detect IPv6 leaks (it is not clear from the wrebsite)? Thanks!
  23. Hi, I got yesterday a 3-day subscription to AirVPN for testing (before bying a longer subscription) but I can't make it work. The main symptom is the extremely low speeds. My PC (Windows 7 64bit Prof) is on a Gigabit line. My normal speeds, according to speedtest.net, are around 500-600mbps (down and up). With AirVPN connected, my speed usually gets lower than 10mbps! Sometimes I get good speeds (60-100mbps) but as soon as I start uTorrent, the connection stalls to the point even DNS resolving fails. Something I noticed: the TAP adapter always says "Unintedified network" and, according to ipconfig its "Default Gateway" is empty. Is that normal? I have tried both OpenVPN and the AirVPN app. in both cases the logs are clean (no errors or warnings) but the problem persists. Also I tried uninstalling everything relevant (even the TAP adapter) and reinstalling but nothing changed. I know my ISP is ok with OpenVPN. They use it for some of their services too. So, any ideas on how to resolve this mess? Or at least how to get some usable debbuging info? Thanks!
  24. Here's something for the Win 8 / Win 10 users struggling with leaky DNS. https://medium.com/@ValdikSS/beware-of-windows-10-dns-resolver-and-dns-leaks-5bc5bfb4e3f1 Or there'e always Linux
  25. I've been experiencing a few problems with Eddie (2.10.3 but also previous versions) on Win 7 64, mainly after waking my computer from sleep... I can't say for sure that Eddie is the cause of the crash, as I suspect faulty Intel drivers, but the consequences are a bit annoying... If the VPN connection was up at the time of the crash, the default DNS settings are not reset and windows tries to use AirVpn DNS... so, nothing works until I connect to an AirVPN server. This could be considered as a good thing, as it assures most of the traffic won't work unless connected to the VPN, but sometimes (like with some online payment sites) it is necessary to use a "standard" connection. And so I have to go through the process of manually changing the DNS server every time for this standard connection to work... It could be interesting to add a feature so that Eddie changes the DNS in use when it is launched (to recover to working settings after a windows crash, for example) and closed (to be sure it really reverts the system to a working configuration), and to be able to manually enter the DNS we want to use. In short, at the moment we have the option to choose which DNS to use when connected to the VPN (preferences/advanced/DNS), and Eddie reads the DNS in use when it starts and considers it as the standard configuration to revert to when it's closed, without checking if it is a valid/working DNS instead of AirVPN DNS (which won't work with a standard connection). I would need the same option, but to choose which DNS to use when NOT connected to the VPN + apply this setting at start and close of Eddie.
×
×
  • Create New...