Jump to content
Not connected, Your IP: 3.146.255.127

Search the Community

Showing results for tags 'gaming', 'vpn', 'AirVPN', 'games' or 'pc'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 369 results

  1. I understand this is vpn site it would be nice to view the forums and customer pages from an onion address. for the privacy minded folks out there who use tor and vpn together and would like to avoid bad tor exit nodes it would not be to hard for air admins to set this up. installing tor on server is very easy thanks!
  2. Hi, the port forwarding feature caught my attention but I have some doubts. I think I'm completely lost with this. Let's say I have a server running Linux, basically serving a webpage, I have port forwarding enabled on my router so anyone with my external IP address can connect to it. Okay now let's say I don't want to give out my real IP address, if I understand how the VPN port forwarding feature works, I could use a VPN server to serve that webpage and hide my real IP address (I'd have to deactivate port forwarding on my router and configure it with AirVPN) Is that right? So I connect that Linux server through OpenVPN to an AirVPN's server with port forwarding enabled. For a VPN server, which is a single IP address, there could be maybe 50 persons connected to it, we're sharing the server somehow, but those persons could also enable port forwarding, so, what are the limits/ranges? Two different persons on the same server can't port forward a same port? How does it work? Thanks
  3. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  4. VIRTUAL MACHINES AND VPN This is a quick short guide to anyone wanting to use VPN over a virtual machine, and also how to use TOR and VPN in a virtual machine. REQUIREMENTS 1. Virtualization software such as: Oracle VM Virtualbox (Free) https://www.virtualbox.org/ VM Ware Workstation (Proffesional Software) http://www.vmware.com/uk/products/workstation.html Windows Virtual PC (Freeware but can only install systems for Windows XP and up) https://www.microsoft.com/en-us/download/details.aspx?id=3702 These are the three most popular options for virtualization software. I personally recommend using Virtualbox if you don't want to pay a lot of money for VM Ware, although it is packed with features and is probably the most advanced virtualization software on the market, hence why it is used by professionals and large companies. 2. An ISO image of the operating system you'd like to use. If you want general purpose virtualization, such as testing applications, I recommend Windows. If you want to use TOR, refer to the TOR section down below. 3. A decent computer. What you will be basically doing is running a computer inside your computer. Yeah I know, Inception, right? Anyway, you should have a decent computer for this, and I recommend minimum of 8gb of RAM. You should also have a decent CPU as it will also affect the performance of the virtual machine. 4. A VPN. If you are on this forum you should be using Air, but this should work with any properly configured VPN. CONFIGURATION I won't go through the set up and installation of a operating system in a virtual machine in this guide because there are plenty of resources out there that explain how to do this. Make sure you are connected to your VPN on your host machine (The computer you are running the virtual machine on). Once you have your virtual machine configured, be it Linux or Windows or any operating system, the essential thing you need to do is switch your virtual machines network adapter to use NAT. It is absolutely essential that you do this, otherwise your true IP address will be used by the virtual machine. Bridged modes simply use your network adapter hardware directly, which reveals your real IP. The NAT (Network Address Translation) mode uses your host operating system's IP address, and if your VPN is configured properly it will mean the virtual machine is using the exact same VPN connection your computer is using. USING TOR IN A VIRTUAL MACHINE If you want to use TOR in a virtual machine, you have two options. You can either use the TOR Browser like in a regular computer, running it on Windows or Linux, whatever your choice may be. I personally recommend using Tails, an operating system designed for anonymity and usage of TOR. TAILS Tails is a live operating system designed for anonymity and privacy, and is released under the GNU/GPL license. All of the source code of the applications that tails uses that are not taken directly from upstream Debian packages are available on their git repositories, they have a guide here: https://tails.boum.org/contribute/git/ The great thing about tails is that it is crammed with programs and features for anonymity, security and privacy. It has email clients, tools for public keys and GPG, disguising the operating system as Windows 8 if you want to use it in public places, instant messaging clients, and many, many more. So now that you know what Tails is, you probably can't wait to get it. The best part is that it is a live operating system, and you don't need to install it. Tails homepage: https://tails.boum.org/ They also made a great installation guide if you want to install Tails to a usb stick: https://tails.boum.org/install/ To use tails in a virtual machine, they have made a guide here: https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/ (The steps for virtualbox in Linux are pretty much the exact same as in Windows) MAKE SURE YOU USE NAT IN THE TAILS VIRTUAL MACHINE Hope you found this guide useful, and don't forget to send it to friends to help them use the internet privately, and securely
  5. Hello, I was wondering, is it possible to buy more simultaneous connections to a single account? I'd rather keep all VPN Payments under one account as i dont fancy buying 3 month subscriptions on multiple accounts lol
  6. Hello ! So they let me out of my cell today, which means I have a lot of pent-up nitpicking energy stored, haha ​At the bottom of this post, there's a respectful critique of how Air handles the explaining of this service to newcomers and my proposed solution. My main arguments for improving the Air service are: - This post about new-people seemingly not feeling welcome. - And this post about Community Mods & more interaction from Air. As the subtext to this forum reads: "Have some feedback and input to share? Don't be shy and drop us a note. We want to hear from you and strive to make our service better and more user friendly for our guests and members alike." So as they say, Challenge Accepted, Good Sir. Time to unleash my inner OCD pokemon! - Introduction & explaining the madness I'd like to post a series of things which I think need some changes; such as the spelling & grammar of various posts. I understand if English isn't the native language of various Staff members and that's fine; that's why I'd like to lend a helping hand. I don't know if it would be wiser to post all this in a support ticket, because it can amount to a lot of content and perhaps by making it public, more people can contribute and then we can keep it nicely organised in one place. I realise it can sound very condescending, patronizing and/or rude to suggest changes in spelling & grammar, so to be clear, it's just because I currently have an urge to help out; I have the utmost respect for AirVPN Staff & those which contribute positively to the community :]. Why does it matter how things are spelled and such? Because appearances, user-friendliness & attention to detail matter, both in terms of technical subjects and non-technical subjects. When I first started, I thought some of the how-tos could use some slight changes, because it was sometimes massively confusing to juggle the technical explanations with the sometimes unclear or vague wording that accompanied them. I like to think that it's AirVPNs attention to security & privacy details which make it so great; so why should the presentational details of the site be any different? :]. I hope it'll be satisfactory & easy for the Air Staff to just copy/paste the corrected texts in, if they decide to make use of them. I'll of course not change the spirit/content of anything. If you have any input, please feel free to make a post. These are just corrections based on what I think sounds right; we're all different :]. I'd like it if the Staff could clarify something in the "About Us" section. Blue text = My changes/corrections. (Sometimes the original isn't wrong, but could just be clearer, hence changes). Red text = The item should be deleted. (In my humble opinion, thank you) Main AirVPN Pages This should cover the entire AirVPN site, except individual posts in the FAQ and the much-dread ToS - Mission Page Corrections - Technical Specs Page Corrections - About Us Page Corrections I'm not sure what was trying to be expressed at the bottom of the article regarding "harsh contrasts against a project of sharing data, etc. etc." Can someone elaborate? Was there some sort of cross-VPN provider cooperation, wherein user data was or was going to be shared? Or was it meant to say that AirVPN was the opposite of all the other providers? Also, I suggest removing the very last bit "(we'll have some news on that probably within the first half of 2013)." since that's quite old and perhaps shouldn't be on an "About Us" page . - Plans Page Corrections "Accepted" sounds much more natural to me than "Allowed" Payment Processors. Oh and the period at the end of Free Trial access should go away too, in order to conform with the other headings. Also, on the Enter page, it's not called OS X anymore, as Apple renamed it MacOS. - Ping Matrix Page Corrections I'm not sure I understand this one correctly. Please say so, if that's the case. - Top Users Page Corrections - Config Generator "More Help" Page Corrections I'm not sure what's meant by "unique download" here. Unique zip archives for each file maybe? - Websites Support Page Corrections - Databases Page Corrections - Client Software Platforms / Environment Pages Corrections - Privacy Notice and Terms Page Corrections I assume it really was "extra-EU" and not "extra-UE". If not, what's UE? I hope it's okay I skip the ToS Explanatory Posts Here's where I would like to say something. A slight critique. I'm really glad that Air Staff have taken the time to put up such nice FAQs.I'm likewise also really glad that they're extremely knowledgeable and can explain things in a technical way.However... As I also said in my new users guide, the main problem with Air is that it's too technical, when it's not needed. This is GREAT for IT-people, but not everyone else.I mean, it's fine to be technical. But I would like to see it either be "toned down" a little in some places, such as the FAQs, where it's very likely that new people will go or:Alternatively, one could provide non-technical explanations alongside the technical ones. Perhaps in spoilers? I LOVE spoilers lol.Case in point, in the FAQ titled "What is a VPN?". The explanations are great and for technical people, it's borderline pornography. But really, if someone doesn't know what a VPN even is, what are the odds of them understanding what things like this mean: I genuinely think that most new users, especially those who don't have an interest in IT, will have a seizure. An FAQ is, I think, meant to leave people with less questions, not more of them. After reading that, I'm sure many would be asking things like: What's a default gateway push? Is it dangerous?What's encapsulation?What's UDP & TCP?Which stream? Twitch.com?HTTP? Socks? Proxy???I of course don't want to sacrifice form or function for the sake of making things ultra-easy for everyone. We can hang a sign on the door saying "Brain Required" if you wish. But it has to be said that attention to things like this, helps us all in one way or another. Air draws in more customers, which means one of the best VPNs gets to keep running. More people see what a quality VPN service is like & perhaps more services like Air will appear. Likewise, more people protected on the internet is a good thing in general. Plus, all the hardwork & passion Air Staff put into this excellent service, won't mean a thing if no one knows how to use it; that's just a fact really. Our aim, in my view, should be to make the service as welcoming as possible, without sacrificing the aforementioned form or function; which is also one of the biggest problems with modern encryption & thus a barrier to mass-adoption. After all, then there'd be no excuse for people to not use AirVPN and we can finally call them on their bluff eh - Original Text - Attempted Example Of Simplified Text What do you think? Sure, it's missing some details and maybe it's not all that accurate, but if it gets the main point across, so what? As I said, we could just make spoilers for both versions. If Air wants, I'll gladly help make more of such explanations for the other things, since I'm quite good at doing so; mainly because I hardly understand it myself lmao, but shhh Thank you for reading and as always, Thank you to AirVPN & Staff for providing this excellent service, as well as the AirVPN community for keeping this place going strong ! I want to know one thing: has Air got any plans on translating the service into different languages? I think it would be so great if they crowd-sourced this. Anyhow, if you spot anything I missed or disagree with a correction, feel free to tell me! Thanks. Now if you'll excuse me, my bed misses me, lol.
  7. Hello, recently since like 1 or 1.5 week my airvpn is having strange behaviour. It now and then suddenly disconnects, and then needs to reconnect / authorize again. Somehow it doesnt feel natural / a pc conflict this problem but i could be wrong. Maybe its important, but these logs no one changed anything like settings not on the network and not on my laptop. The first 2 disconnects i was sleeping, so no user activity on the laptop as well. last disconnect i was browsing. . 2016.07.15 23:11:45 - Systems & servers data update completed . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:23:44 - OpenVPN > Validating certificate key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:23:44 - OpenVPN > VERIFY KU OK . 2016.07.15 23:23:44 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:23:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:23:44 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:23:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:23:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:23:46 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:00 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060) . 2016.07.15 23:40:00 - OpenVPN > Connection reset, restarting [-1] . 2016.07.15 23:40:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.15 23:40:00 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.15 23:40:00 - Disconnecting . 2016.07.15 23:40:00 - Management - Send 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.15 23:40:00 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.15 23:40:00 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.15 23:40:00 - OpenVPN > Exiting due to fatal error . 2016.07.15 23:40:01 - Connection terminated. I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.15 23:40:02 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:21 - Checking authorization ... ! 2016.07.15 23:40:21 - Connecting to Azmidiske (Sweden, Uppsala) . 2016.07.15 23:40:21 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.15 23:40:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.15 23:40:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.15 23:40:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.15 23:40:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:22 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.15 23:40:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.141:443 [nonblock] . 2016.07.15 23:40:23 - OpenVPN > TCP connection established with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.15 23:40:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.141:443, sid=f51e2740 2526a036 . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.15 23:40:23 - OpenVPN > Validating certificate key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.15 23:40:23 - OpenVPN > VERIFY KU OK . 2016.07.15 23:40:23 - OpenVPN > Validating certificate extended key usage . 2016.07.15 23:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.15 23:40:23 - OpenVPN > VERIFY EKU OK . 2016.07.15 23:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.15 23:40:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.15 23:40:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.15 23:40:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.141:443 . 2016.07.15 23:40:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.15 23:40:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.224 255.255.0.0' . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.15 23:40:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.15 23:40:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.15 23:40:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.15 23:40:28 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.15 23:40:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.15 23:40:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.224/255.255.0.0 [sUCCEEDED] . 2016.07.15 23:40:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.224/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.15 23:40:28 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.15 23:40:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.141 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.15 23:40:33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:33 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.15 23:40:33 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.15 23:40:33 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.15 23:40:33 - OpenVPN > Route addition fallback to route.exe . 2016.07.15 23:40:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.15 23:40:34 - Starting Management Interface . 2016.07.15 23:40:34 - OpenVPN > Initialization Sequence Completed I 2016.07.15 23:40:34 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.15 23:40:34 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.15 23:40:34 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.15 23:40:34 - Flushing DNS I 2016.07.15 23:40:35 - Checking DNS ! 2016.07.15 23:40:36 - Connected. . 2016.07.15 23:40:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.15 23:40:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.15 23:42:20 - Updating systems & servers data ... . 2016.07.15 23:42:21 - Systems & servers data update completed . 2016.07.16 00:12:56 - Updating systems & servers data ... . 2016.07.16 00:12:57 - Systems & servers data update completed . 2016.07.16 00:40:25 - OpenVPN > TLS: soft reset sec=0 bytes=1306479/0 pkts=4397/0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 00:40:26 - OpenVPN > Validating certificate key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 00:40:26 - OpenVPN > VERIFY KU OK . 2016.07.16 00:40:26 - OpenVPN > Validating certificate extended key usage . 2016.07.16 00:40:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 00:40:26 - OpenVPN > VERIFY EKU OK . 2016.07.16 00:40:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 00:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 00:40:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 00:43:32 - Updating systems & servers data ... . 2016.07.16 00:43:33 - Systems & servers data update completed . 2016.07.16 01:13:50 - Updating systems & servers data ... . 2016.07.16 01:13:52 - Systems & servers data update completed I 2016.07.16 01:40:25 - Renewing TLS key . 2016.07.16 01:40:25 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 01:40:27 - OpenVPN > TLS: soft reset sec=0 bytes=14841430/0 pkts=38149/0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 01:40:27 - OpenVPN > Validating certificate key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 01:40:27 - OpenVPN > VERIFY KU OK . 2016.07.16 01:40:27 - OpenVPN > Validating certificate extended key usage . 2016.07.16 01:40:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 01:40:27 - OpenVPN > VERIFY EKU OK . 2016.07.16 01:40:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 01:40:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 01:40:28 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 01:44:32 - Updating systems & servers data ... . 2016.07.16 01:44:34 - Systems & servers data update completed . 2016.07.16 02:14:41 - Updating systems & servers data ... . 2016.07.16 02:14:42 - Systems & servers data update completed I 2016.07.16 02:40:27 - Renewing TLS key . 2016.07.16 02:40:27 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 02:40:28 - OpenVPN > TLS: soft reset sec=0 bytes=24638897/0 pkts=53803/0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 02:40:28 - OpenVPN > Validating certificate key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 02:40:28 - OpenVPN > VERIFY KU OK . 2016.07.16 02:40:28 - OpenVPN > Validating certificate extended key usage . 2016.07.16 02:40:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 02:40:28 - OpenVPN > VERIFY EKU OK . 2016.07.16 02:40:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 02:40:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 02:40:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 02:44:44 - Updating systems & servers data ... . 2016.07.16 02:44:46 - Systems & servers data update completed . 2016.07.16 03:15:37 - Updating systems & servers data ... . 2016.07.16 03:15:39 - Systems & servers data update completed I 2016.07.16 03:40:28 - Renewing TLS key . 2016.07.16 03:40:28 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 03:40:29 - OpenVPN > TLS: soft reset sec=0 bytes=11152806/0 pkts=38076/0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 03:40:29 - OpenVPN > Validating certificate key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 03:40:29 - OpenVPN > VERIFY KU OK . 2016.07.16 03:40:29 - OpenVPN > Validating certificate extended key usage . 2016.07.16 03:40:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 03:40:29 - OpenVPN > VERIFY EKU OK . 2016.07.16 03:40:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 03:40:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 03:40:31 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 03:46:14 - Updating systems & servers data ... . 2016.07.16 03:46:16 - Systems & servers data update completed . 2016.07.16 04:16:50 - Updating systems & servers data ... . 2016.07.16 04:16:51 - Systems & servers data update completed I 2016.07.16 04:40:29 - Renewing TLS key . 2016.07.16 04:40:29 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 04:40:30 - OpenVPN > Validating certificate key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 04:40:30 - OpenVPN > VERIFY KU OK . 2016.07.16 04:40:30 - OpenVPN > Validating certificate extended key usage . 2016.07.16 04:40:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 04:40:30 - OpenVPN > VERIFY EKU OK . 2016.07.16 04:40:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 04:40:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 04:40:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 04:47:30 - Updating systems & servers data ... . 2016.07.16 04:47:31 - Systems & servers data update completed . 2016.07.16 05:18:05 - Updating systems & servers data ... . 2016.07.16 05:18:06 - Systems & servers data update completed I 2016.07.16 05:40:30 - Renewing TLS key . 2016.07.16 05:40:30 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 05:40:31 - OpenVPN > Validating certificate key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 05:40:31 - OpenVPN > VERIFY KU OK . 2016.07.16 05:40:31 - OpenVPN > Validating certificate extended key usage . 2016.07.16 05:40:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 05:40:31 - OpenVPN > VERIFY EKU OK . 2016.07.16 05:40:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 05:40:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 05:40:33 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 05:48:36 - Updating systems & servers data ... . 2016.07.16 05:48:37 - Systems & servers data update completed . 2016.07.16 06:19:12 - Updating systems & servers data ... . 2016.07.16 06:19:13 - Systems & servers data update completed I 2016.07.16 06:40:31 - Renewing TLS key . 2016.07.16 06:40:31 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 06:40:32 - OpenVPN > Validating certificate key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 06:40:32 - OpenVPN > VERIFY KU OK . 2016.07.16 06:40:32 - OpenVPN > Validating certificate extended key usage . 2016.07.16 06:40:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 06:40:32 - OpenVPN > VERIFY EKU OK . 2016.07.16 06:40:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 06:40:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 06:40:34 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 06:49:47 - Updating systems & servers data ... . 2016.07.16 06:49:48 - Systems & servers data update completed . 2016.07.16 07:20:23 - Updating systems & servers data ... . 2016.07.16 07:20:24 - Systems & servers data update completed I 2016.07.16 07:40:32 - Renewing TLS key . 2016.07.16 07:40:32 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 07:40:34 - OpenVPN > TLS: soft reset sec=0 bytes=5686342/0 pkts=37009/0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 07:40:34 - OpenVPN > Validating certificate key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 07:40:34 - OpenVPN > VERIFY KU OK . 2016.07.16 07:40:34 - OpenVPN > Validating certificate extended key usage . 2016.07.16 07:40:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 07:40:34 - OpenVPN > VERIFY EKU OK . 2016.07.16 07:40:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 07:40:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 07:40:36 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 07:50:59 - Updating systems & servers data ... . 2016.07.16 07:51:00 - Systems & servers data update completed . 2016.07.16 08:21:35 - Updating systems & servers data ... . 2016.07.16 08:21:37 - Systems & servers data update completed I 2016.07.16 08:40:34 - Renewing TLS key . 2016.07.16 08:40:34 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 08:40:35 - OpenVPN > Validating certificate key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 08:40:35 - OpenVPN > VERIFY KU OK . 2016.07.16 08:40:35 - OpenVPN > Validating certificate extended key usage . 2016.07.16 08:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 08:40:35 - OpenVPN > VERIFY EKU OK . 2016.07.16 08:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 08:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 08:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 08:52:12 - Updating systems & servers data ... . 2016.07.16 08:52:13 - Systems & servers data update completed . 2016.07.16 09:22:46 - Updating systems & servers data ... . 2016.07.16 09:22:47 - Systems & servers data update completed I 2016.07.16 09:40:35 - Renewing TLS key . 2016.07.16 09:40:35 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 09:40:36 - OpenVPN > Validating certificate key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 09:40:36 - OpenVPN > VERIFY KU OK . 2016.07.16 09:40:36 - OpenVPN > Validating certificate extended key usage . 2016.07.16 09:40:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 09:40:36 - OpenVPN > VERIFY EKU OK . 2016.07.16 09:40:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 09:40:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 09:40:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 09:53:22 - Updating systems & servers data ... . 2016.07.16 09:53:23 - Systems & servers data update completed . 2016.07.16 10:23:58 - Updating systems & servers data ... . 2016.07.16 10:23:58 - Systems & servers data update completed I 2016.07.16 10:40:36 - Renewing TLS key . 2016.07.16 10:40:36 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 10:40:37 - OpenVPN > TLS: soft reset sec=0 bytes=258557956/0 pkts=300692/0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:40:37 - OpenVPN > Validating certificate key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:40:37 - OpenVPN > VERIFY KU OK . 2016.07.16 10:40:37 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:40:37 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:40:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:40:38 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:33 - Updating systems & servers data ... . 2016.07.16 10:54:36 - OpenVPN > Connection reset, restarting [-1] . 2016.07.16 10:54:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.16 10:54:36 - OpenVPN > Restart pause, 5 second(s) ! 2016.07.16 10:54:36 - Disconnecting . 2016.07.16 10:54:36 - Management - Send 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.16 10:54:36 - OpenVPN > MANAGEMENT: Client disconnected . 2016.07.16 10:54:36 - OpenVPN > Assertion failed at misc.c:788 . 2016.07.16 10:54:36 - OpenVPN > Exiting due to fatal error . 2016.07.16 10:54:37 - Connection terminated. . 2016.07.16 10:54:37 - Systems & servers data update completed I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.16 10:54:38 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:54:50 - Checking authorization ... ! 2016.07.16 10:54:50 - Connecting to Algieba (Sweden, Uppsala) . 2016.07.16 10:54:51 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.16 10:54:51 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.16 10:54:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.16 10:54:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.16 10:54:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:51 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.16 10:54:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.16 10:54:52 - OpenVPN > TCP connection established with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.16 10:54:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=d15a8dca c995bc1d . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 10:54:52 - OpenVPN > Validating certificate key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 10:54:52 - OpenVPN > VERIFY KU OK . 2016.07.16 10:54:52 - OpenVPN > Validating certificate extended key usage . 2016.07.16 10:54:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 10:54:52 - OpenVPN > VERIFY EKU OK . 2016.07.16 10:54:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 10:54:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 10:54:54 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 10:54:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443 . 2016.07.16 10:54:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.16 10:54:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.190 255.255.0.0' . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.16 10:54:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.16 10:54:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.16 10:54:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.16 10:54:57 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.16 10:54:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.16 10:54:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.190/255.255.0.0 [sUCCEEDED] . 2016.07.16 10:54:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.190/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.16 10:54:57 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.16 10:55:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=30] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.16 10:55:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=24] . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.16 10:55:02 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.16 10:55:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.16 10:55:02 - OpenVPN > Route addition fallback to route.exe . 2016.07.16 10:55:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.16 10:55:02 - Starting Management Interface . 2016.07.16 10:55:02 - OpenVPN > Initialization Sequence Completed I 2016.07.16 10:55:02 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.16 10:55:02 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.16 10:55:03 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.16 10:55:03 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.16 10:55:03 - Flushing DNS I 2016.07.16 10:55:04 - Checking DNS ! 2016.07.16 10:55:05 - Connected. . 2016.07.16 10:55:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.16 10:55:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.16 11:25:14 - Updating systems & servers data ... . 2016.07.16 11:25:17 - Systems & servers data update completed . 2016.07.16 11:54:54 - OpenVPN > TLS: soft reset sec=0 bytes=141395814/0 pkts=215960/0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 11:54:54 - OpenVPN > Validating certificate key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 11:54:54 - OpenVPN > VERIFY KU OK . 2016.07.16 11:54:54 - OpenVPN > Validating certificate extended key usage . 2016.07.16 11:54:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 11:54:54 - OpenVPN > VERIFY EKU OK . 2016.07.16 11:54:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 11:54:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 11:54:55 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 11:55:51 - Updating systems & servers data ... . 2016.07.16 11:55:52 - Systems & servers data update completed . 2016.07.16 12:26:30 - Updating systems & servers data ... . 2016.07.16 12:26:31 - Systems & servers data update completed I 2016.07.16 12:54:54 - Renewing TLS key . 2016.07.16 12:54:54 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 12:54:55 - OpenVPN > TLS: soft reset sec=0 bytes=272454219/0 pkts=360490/0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 12:54:55 - OpenVPN > Validating certificate key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 12:54:55 - OpenVPN > VERIFY KU OK . 2016.07.16 12:54:55 - OpenVPN > Validating certificate extended key usage . 2016.07.16 12:54:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 12:54:55 - OpenVPN > VERIFY EKU OK . 2016.07.16 12:54:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 12:54:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 12:54:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 12:57:10 - Updating systems & servers data ... . 2016.07.16 12:57:11 - Systems & servers data update completed . 2016.07.16 13:27:56 - Updating systems & servers data ... . 2016.07.16 13:27:58 - Systems & servers data update completed I 2016.07.16 13:54:55 - Renewing TLS key . 2016.07.16 13:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 13:54:56 - OpenVPN > TLS: soft reset sec=0 bytes=150296496/0 pkts=248976/0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 13:54:56 - OpenVPN > Validating certificate key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 13:54:56 - OpenVPN > VERIFY KU OK . 2016.07.16 13:54:56 - OpenVPN > Validating certificate extended key usage . 2016.07.16 13:54:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 13:54:56 - OpenVPN > VERIFY EKU OK . 2016.07.16 13:54:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 13:54:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 13:54:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 13:58:48 - Updating systems & servers data ... . 2016.07.16 13:58:50 - Systems & servers data update completed . 2016.07.16 14:29:36 - Updating systems & servers data ... . 2016.07.16 14:29:37 - Systems & servers data update completed I 2016.07.16 14:54:56 - Renewing TLS key . 2016.07.16 14:54:56 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 14:54:57 - OpenVPN > TLS: soft reset sec=0 bytes=238603046/0 pkts=356017/0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 14:54:57 - OpenVPN > Validating certificate key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 14:54:57 - OpenVPN > VERIFY KU OK . 2016.07.16 14:54:57 - OpenVPN > Validating certificate extended key usage . 2016.07.16 14:54:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 14:54:57 - OpenVPN > VERIFY EKU OK . 2016.07.16 14:54:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 14:54:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 14:54:58 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 14:59:53 - Updating systems & servers data ... . 2016.07.16 14:59:54 - Systems & servers data update completed . 2016.07.16 15:30:02 - Updating systems & servers data ... . 2016.07.16 15:30:03 - Systems & servers data update completed I 2016.07.16 15:54:57 - Renewing TLS key . 2016.07.16 15:54:57 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 15:54:58 - OpenVPN > TLS: soft reset sec=0 bytes=70346271/0 pkts=148144/0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 15:54:58 - OpenVPN > Validating certificate key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 15:54:58 - OpenVPN > VERIFY KU OK . 2016.07.16 15:54:58 - OpenVPN > Validating certificate extended key usage . 2016.07.16 15:54:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 15:54:58 - OpenVPN > VERIFY EKU OK . 2016.07.16 15:54:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 15:55:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 15:55:00 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 16:00:35 - Updating systems & servers data ... . 2016.07.16 16:00:36 - Systems & servers data update completed . 2016.07.16 16:31:36 - Updating systems & servers data ... . 2016.07.16 16:31:37 - Systems & servers data update completed I 2016.07.16 16:54:58 - Renewing TLS key . 2016.07.16 16:54:58 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 16:55:00 - OpenVPN > TLS: soft reset sec=0 bytes=289003815/0 pkts=406451/0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 16:55:00 - OpenVPN > Validating certificate key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 16:55:00 - OpenVPN > VERIFY KU OK . 2016.07.16 16:55:00 - OpenVPN > Validating certificate extended key usage . 2016.07.16 16:55:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 16:55:00 - OpenVPN > VERIFY EKU OK . 2016.07.16 16:55:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 16:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 16:55:01 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 17:01:46 - Updating systems & servers data ... . 2016.07.16 17:01:48 - Systems & servers data update completed . 2016.07.16 17:32:07 - Updating systems & servers data ... . 2016.07.16 17:32:08 - Systems & servers data update completed I 2016.07.16 17:55:00 - Renewing TLS key . 2016.07.16 17:55:00 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 17:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=261338769/0 pkts=368887/0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 17:55:02 - OpenVPN > Validating certificate key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 17:55:02 - OpenVPN > VERIFY KU OK . 2016.07.16 17:55:02 - OpenVPN > Validating certificate extended key usage . 2016.07.16 17:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 17:55:02 - OpenVPN > VERIFY EKU OK . 2016.07.16 17:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 17:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 17:55:07 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 18:02:17 - Updating systems & servers data ... . 2016.07.16 18:02:21 - Systems & servers data update completed . 2016.07.16 18:33:01 - Updating systems & servers data ... . 2016.07.16 18:33:05 - Systems & servers data update completed I 2016.07.16 18:55:01 - Renewing TLS key . 2016.07.16 18:55:01 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 18:55:06 - OpenVPN > Validating certificate key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 18:55:06 - OpenVPN > VERIFY KU OK . 2016.07.16 18:55:06 - OpenVPN > Validating certificate extended key usage . 2016.07.16 18:55:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 18:55:06 - OpenVPN > VERIFY EKU OK . 2016.07.16 18:55:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 18:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 18:55:08 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 19:03:29 - Updating systems & servers data ... . 2016.07.16 19:03:33 - Systems & servers data update completed . 2016.07.16 19:34:20 - Updating systems & servers data ... . 2016.07.16 19:34:21 - Systems & servers data update completed I 2016.07.16 19:55:06 - Renewing TLS key . 2016.07.16 19:55:06 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 19:55:08 - OpenVPN > Validating certificate key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 19:55:08 - OpenVPN > VERIFY KU OK . 2016.07.16 19:55:08 - OpenVPN > Validating certificate extended key usage . 2016.07.16 19:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 19:55:08 - OpenVPN > VERIFY EKU OK . 2016.07.16 19:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 19:55:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 19:55:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 20:04:20 - Updating systems & servers data ... . 2016.07.16 20:04:22 - Systems & servers data update completed . 2016.07.16 20:34:41 - Updating systems & servers data ... . 2016.07.16 20:34:43 - Systems & servers data update completed I 2016.07.16 20:55:08 - Renewing TLS key . 2016.07.16 20:55:08 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 20:55:10 - OpenVPN > TLS: soft reset sec=0 bytes=299919922/0 pkts=402243/0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 20:55:10 - OpenVPN > Validating certificate key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 20:55:10 - OpenVPN > VERIFY KU OK . 2016.07.16 20:55:10 - OpenVPN > Validating certificate extended key usage . 2016.07.16 20:55:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 20:55:10 - OpenVPN > VERIFY EKU OK . 2016.07.16 20:55:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 20:55:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 20:55:12 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 21:04:51 - Updating systems & servers data ... . 2016.07.16 21:04:56 - Systems & servers data update completed . 2016.07.16 21:35:14 - Updating systems & servers data ... . 2016.07.16 21:35:15 - Systems & servers data update completed I 2016.07.16 21:55:10 - Renewing TLS key . 2016.07.16 21:55:10 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 21:55:12 - OpenVPN > TLS: soft reset sec=0 bytes=325518219/0 pkts=430958/0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 21:55:12 - OpenVPN > Validating certificate key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 21:55:12 - OpenVPN > VERIFY KU OK . 2016.07.16 21:55:12 - OpenVPN > Validating certificate extended key usage . 2016.07.16 21:55:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 21:55:12 - OpenVPN > VERIFY EKU OK . 2016.07.16 21:55:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 21:55:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 21:55:14 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 22:06:16 - Updating systems & servers data ... . 2016.07.16 22:06:18 - Systems & servers data update completed . 2016.07.16 22:37:05 - Updating systems & servers data ... . 2016.07.16 22:37:18 - Systems & servers data update completed I 2016.07.16 22:55:12 - Renewing TLS key . 2016.07.16 22:55:12 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 22:55:14 - OpenVPN > TLS: soft reset sec=0 bytes=269122759/0 pkts=379891/0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 22:55:14 - OpenVPN > Validating certificate key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 22:55:14 - OpenVPN > VERIFY KU OK . 2016.07.16 22:55:14 - OpenVPN > Validating certificate extended key usage . 2016.07.16 22:55:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 22:55:14 - OpenVPN > VERIFY EKU OK . 2016.07.16 22:55:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 22:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 22:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.16 23:07:35 - Updating systems & servers data ... . 2016.07.16 23:07:36 - Systems & servers data update completed . 2016.07.16 23:38:31 - Updating systems & servers data ... . 2016.07.16 23:38:33 - Systems & servers data update completed I 2016.07.16 23:55:14 - Renewing TLS key . 2016.07.16 23:55:14 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.16 23:55:18 - OpenVPN > Validating certificate key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.16 23:55:18 - OpenVPN > VERIFY KU OK . 2016.07.16 23:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.16 23:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.16 23:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.16 23:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.16 23:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.16 23:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 00:08:51 - Updating systems & servers data ... . 2016.07.17 00:08:59 - Systems & servers data update completed . 2016.07.17 00:39:42 - Updating systems & servers data ... . 2016.07.17 00:39:43 - Systems & servers data update completed I 2016.07.17 00:55:16 - Renewing TLS key . 2016.07.17 00:55:16 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 00:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 00:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 00:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 00:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 00:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 00:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 00:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 00:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 01:10:19 - Updating systems & servers data ... . 2016.07.17 01:10:20 - Systems & servers data update completed . 2016.07.17 01:40:53 - Updating systems & servers data ... . 2016.07.17 01:40:54 - Systems & servers data update completed . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 01:55:15 - OpenVPN > Validating certificate key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 01:55:15 - OpenVPN > VERIFY KU OK . 2016.07.17 01:55:15 - OpenVPN > Validating certificate extended key usage . 2016.07.17 01:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 01:55:15 - OpenVPN > VERIFY EKU OK . 2016.07.17 01:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 01:55:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 01:55:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 02:11:42 - Updating systems & servers data ... . 2016.07.17 02:11:44 - Systems & servers data update completed . 2016.07.17 02:42:39 - Updating systems & servers data ... . 2016.07.17 02:42:40 - Systems & servers data update completed I 2016.07.17 02:55:15 - Renewing TLS key . 2016.07.17 02:55:15 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 02:55:17 - OpenVPN > TLS: soft reset sec=0 bytes=194567558/0 pkts=272952/0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 02:55:17 - OpenVPN > Validating certificate key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 02:55:17 - OpenVPN > VERIFY KU OK . 2016.07.17 02:55:17 - OpenVPN > Validating certificate extended key usage . 2016.07.17 02:55:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 02:55:17 - OpenVPN > VERIFY EKU OK . 2016.07.17 02:55:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 02:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 02:55:18 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 03:13:09 - Updating systems & servers data ... . 2016.07.17 03:13:11 - Systems & servers data update completed . 2016.07.17 03:44:32 - Updating systems & servers data ... . 2016.07.17 03:44:39 - Systems & servers data update completed I 2016.07.17 03:55:17 - Renewing TLS key . 2016.07.17 03:55:17 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 03:55:18 - OpenVPN > TLS: soft reset sec=0 bytes=1165265937/0 pkts=1309392/0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 03:55:18 - OpenVPN > Validating certificate key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 03:55:18 - OpenVPN > VERIFY KU OK . 2016.07.17 03:55:18 - OpenVPN > Validating certificate extended key usage . 2016.07.17 03:55:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 03:55:18 - OpenVPN > VERIFY EKU OK . 2016.07.17 03:55:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 03:55:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 03:55:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 04:14:58 - Updating systems & servers data ... . 2016.07.17 04:14:59 - Systems & servers data update completed . 2016.07.17 04:45:21 - Updating systems & servers data ... . 2016.07.17 04:45:23 - Systems & servers data update completed I 2016.07.17 04:55:18 - Renewing TLS key . 2016.07.17 04:55:18 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 04:55:19 - OpenVPN > TLS: soft reset sec=0 bytes=233301899/0 pkts=328699/0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 04:55:19 - OpenVPN > Validating certificate key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 04:55:19 - OpenVPN > VERIFY KU OK . 2016.07.17 04:55:19 - OpenVPN > Validating certificate extended key usage . 2016.07.17 04:55:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 04:55:19 - OpenVPN > VERIFY EKU OK . 2016.07.17 04:55:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 04:55:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 04:55:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 05:15:32 - Updating systems & servers data ... . 2016.07.17 05:15:34 - Systems & servers data update completed . 2016.07.17 05:45:51 - Updating systems & servers data ... . 2016.07.17 05:45:52 - Systems & servers data update completed I 2016.07.17 05:55:19 - Renewing TLS key . 2016.07.17 05:55:19 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 05:55:20 - OpenVPN > TLS: soft reset sec=0 bytes=212919884/0 pkts=266892/0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 05:55:20 - OpenVPN > Validating certificate key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 05:55:20 - OpenVPN > VERIFY KU OK . 2016.07.17 05:55:20 - OpenVPN > Validating certificate extended key usage . 2016.07.17 05:55:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 05:55:20 - OpenVPN > VERIFY EKU OK . 2016.07.17 05:55:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 05:55:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 05:55:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 06:16:10 - Updating systems & servers data ... . 2016.07.17 06:16:11 - Systems & servers data update completed . 2016.07.17 06:46:25 - Updating systems & servers data ... . 2016.07.17 06:46:26 - Systems & servers data update completed I 2016.07.17 06:55:20 - Renewing TLS key . 2016.07.17 06:55:20 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 06:55:21 - OpenVPN > TLS: soft reset sec=0 bytes=213225290/0 pkts=259269/0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 06:55:21 - OpenVPN > Validating certificate key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 06:55:21 - OpenVPN > VERIFY KU OK . 2016.07.17 06:55:21 - OpenVPN > Validating certificate extended key usage . 2016.07.17 06:55:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 06:55:21 - OpenVPN > VERIFY EKU OK . 2016.07.17 06:55:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 06:55:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 06:55:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 07:16:38 - Updating systems & servers data ... . 2016.07.17 07:16:39 - Systems & servers data update completed . 2016.07.17 07:46:52 - Updating systems & servers data ... . 2016.07.17 07:46:54 - Systems & servers data update completed I 2016.07.17 07:55:21 - Renewing TLS key . 2016.07.17 07:55:21 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 07:55:22 - OpenVPN > TLS: soft reset sec=0 bytes=236101110/0 pkts=319176/0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 07:55:22 - OpenVPN > Validating certificate key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 07:55:22 - OpenVPN > VERIFY KU OK . 2016.07.17 07:55:22 - OpenVPN > Validating certificate extended key usage . 2016.07.17 07:55:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 07:55:22 - OpenVPN > VERIFY EKU OK . 2016.07.17 07:55:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 07:55:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 07:55:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 08:17:02 - Updating systems & servers data ... . 2016.07.17 08:17:03 - Systems & servers data update completed . 2016.07.17 08:48:09 - Updating systems & servers data ... . 2016.07.17 08:48:10 - Systems & servers data update completed I 2016.07.17 08:55:22 - Renewing TLS key . 2016.07.17 08:55:22 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 08:55:23 - OpenVPN > TLS: soft reset sec=0 bytes=252179535/0 pkts=365885/0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 08:55:23 - OpenVPN > Validating certificate key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 08:55:23 - OpenVPN > VERIFY KU OK . 2016.07.17 08:55:23 - OpenVPN > Validating certificate extended key usage . 2016.07.17 08:55:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 08:55:23 - OpenVPN > VERIFY EKU OK . 2016.07.17 08:55:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 08:55:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 08:55:24 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 09:19:02 - Updating systems & servers data ... . 2016.07.17 09:19:03 - Systems & servers data update completed . 2016.07.17 09:49:27 - Updating systems & servers data ... . 2016.07.17 09:49:30 - Systems & servers data update completed I 2016.07.17 09:55:23 - Renewing TLS key . 2016.07.17 09:55:23 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 09:55:24 - OpenVPN > TLS: soft reset sec=0 bytes=250581123/0 pkts=320129/0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 09:55:24 - OpenVPN > Validating certificate key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 09:55:24 - OpenVPN > VERIFY KU OK . 2016.07.17 09:55:24 - OpenVPN > Validating certificate extended key usage . 2016.07.17 09:55:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 09:55:24 - OpenVPN > VERIFY EKU OK . 2016.07.17 09:55:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 09:55:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 09:55:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 10:20:00 - Updating systems & servers data ... . 2016.07.17 10:20:01 - Systems & servers data update completed . 2016.07.17 10:50:19 - Updating systems & servers data ... . 2016.07.17 10:50:20 - Systems & servers data update completed I 2016.07.17 10:55:24 - Renewing TLS key . 2016.07.17 10:55:24 - OpenVPN > TLS: tls_process: killed expiring key . 2016.07.17 10:55:25 - OpenVPN > TLS: soft reset sec=0 bytes=397505535/0 pkts=484501/0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 10:55:25 - OpenVPN > Validating certificate key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 10:55:25 - OpenVPN > VERIFY KU OK . 2016.07.17 10:55:25 - OpenVPN > Validating certificate extended key usage . 2016.07.17 10:55:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 10:55:25 - OpenVPN > VERIFY EKU OK . 2016.07.17 10:55:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 10:55:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 10:55:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:04:25 - OpenVPN > write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054) . 2016.07.17 11:04:25 - OpenVPN > Connection reset, restarting [-1] ! 2016.07.17 11:04:25 - Disconnecting . 2016.07.17 11:04:31 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:36 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2016.07.17 11:04:40 - OpenVPN > Restart pause, 5 second(s) . 2016.07.17 11:04:42 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:44 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:04:44 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.142:443 [nonblock] . 2016.07.17 11:04:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.17 11:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:46 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:46 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:46 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:51 - Management - Send 'signal SIGTERM' . 2016.07.17 11:04:52 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:04:54 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Kan element niet vinden. . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Route deletion fallback to route.exe . 2016.07.17 11:04:54 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:04:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.17 11:04:54 - OpenVPN > Closing TUN/TAP interface . 2016.07.17 11:04:54 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.07.17 11:04:57 - Connection terminated. I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:15 - DNS of a network adapter restored to original settings (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.07.17 11:05:16 - DNS of a network adapter restored to original settings (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:05:42 - Checking authorization ... ! 2016.07.17 11:05:42 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.17 11:05:45 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.07.17 11:05:45 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.07.17 11:05:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.17 11:05:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.17 11:05:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:45 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2016.07.17 11:05:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.145:443 [nonblock] . 2016.07.17 11:05:46 - OpenVPN > TCP connection established with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.07.17 11:05:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=e4192879 ebb234b9 . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.17 11:05:47 - OpenVPN > Validating certificate key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.17 11:05:47 - OpenVPN > VERIFY KU OK . 2016.07.17 11:05:47 - OpenVPN > Validating certificate extended key usage . 2016.07.17 11:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.17 11:05:47 - OpenVPN > VERIFY EKU OK . 2016.07.17 11:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.17 11:05:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.17 11:05:49 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.07.17 11:05:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.17 11:05:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.17 11:05:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.195 255.255.0.0' . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.17 11:05:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.17 11:05:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.17 11:05:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.17 11:05:53 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{803E74C5-D35D-4D62-BC35-D64DC578DDC0}.tap . 2016.07.17 11:05:53 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.17 11:05:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.195/255.255.0.0 [sUCCEEDED] . 2016.07.17 11:05:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.195/255.255.0.0 on interface {803E74C5-D35D-4D62-BC35-D64DC578DDC0} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.07.17 11:05:53 - OpenVPN > Successful ARP Flush on interface [24] {803E74C5-D35D-4D62-BC35-D64DC578DDC0} . 2016.07.17 11:05:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=1 u/d=up . 2016.07.17 11:05:57 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:57 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:57 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:57 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 30 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.07.17 11:05:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.17 11:05:58 - OpenVPN > C:\Windows\system32\route.exe ADD 66.211.169.3 MASK 255.255.255.255 192.168.0.1 . 2016.07.17 11:05:58 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches) . 2016.07.17 11:05:58 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.07.17 11:05:58 - OpenVPN > Route addition fallback to route.exe . 2016.07.17 11:05:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.07.17 11:05:58 - Starting Management Interface . 2016.07.17 11:05:58 - OpenVPN > Initialization Sequence Completed I 2016.07.17 11:05:58 - DNS of a network adapter forced (VMware Virtual Ethernet Adapter for VMnet1) I 2016.07.17 11:05:59 - DNS of a network adapter forced (Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi-adapter) I 2016.07.17 11:05:59 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.07.17 11:06:00 - DNS of a network adapter forced (Linksys WUSB600N Wireless-N USB Network Adapter with Dual-Band ver. 2 #3) I 2016.07.17 11:06:01 - Flushing DNS I 2016.07.17 11:06:04 - Checking DNS ! 2016.07.17 11:06:07 - Connected. . 2016.07.17 11:06:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.07.17 11:06:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  8. As of a few days ago Netflix seems to be blocked when using any airvpn server from all apple platforms that I own ( iphone, ipad, appletv generation 2). If you try to access netflix from iphone and ipad theres only a generic error message about "unable to play the title". On appleTV generation 2&3 theres a specific error message: Netflix 139: NFErr_MC_Authfailure
  9. So, I have been informed by fellow classmates that the use of a VPN on public school wifi is considered a felony under US law under the charge of tampering with a government network. Is this true? How would this hold up in court?
  10. Hello, This is my first VPN - so far so good. The good - lots of servers! The bad - sometimes have to log on more than once. (rare) - I get a connection, but no internet. disconnect reconnect, I am usually good I installed the TAP9 adapter, but still for browser that have webrtc that can't be disabled - Chrome. My IP still comes through. Is that just a browser issue? Or can I do something about it. I do not like that!!!! Mr. V
  11. I'm trying to use the portable version (no mono) of the client on Linux Mint. When I try to connect to a server I get an error "OpenVPN is already running". I don't think I have anything running in background that would cause this message to appear. I have one more VPN client installed on my machine from other provider but I have to manually start it. I checked on System Monitor for processes with "vpn" in name and I didn't find anything. Do you know what may cause this and how to solve the issue?
  12. What if the initial connection to the VPN server was established over a hidden service? Wouldn't this be a more elegant and secure solution to VPN over TOR?
  13. Update. The FBI falls 2 votes short of viewing our browsing history without a warrant http://thenextweb.com/insider/2016/06/23/fbi-falls-2-votes-short-of-viewing-our-browsing-history-without-a-warrant/ But this has not been made final yet.{ http://www.decidethefuture.org LESS THAN 24 HOURS REMAINING: The Senate is about to vote on an amendment that would give the FBI your browsing history without a warrant.} I saw this very important info and thought that the community at airvpn should know. This would effect vpn's. The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack. The changes to Rule 41 would make it easier for them to break into our computers, take data, and engage in remote surveillance. These changes could impact any person using a computer with Internet access anywhere in the world. However, they will disproportionately impact people using privacy-protective technologies, including Tor and VPNs. https://noglobalwarrants.org/#take-action ALSO http://www.decidethefuture.org LESS THAN 24 HOURS REMAINING: The Senate is about to vote on an amendment that would give the FBI your browsing history without a warrant. Please post any comments you have about these possible rules/bills
  14. Hi, I have used so many month without any problem the AIRVPN client on ubuntu 14.04 Today I have this problem The client didn't connect. It remain on " Checking dns" and after change the server and again whith !checking dns" I have tred to reinstall client, restart, shutdown router...update ubuntu nothing going well....please help me. Note that I am new on linux Here is the log (i have put xxxx on ip ) I 2016.06.25 14:34:58 - AirVPN client version: 2.10.3 / x86, System: Linux, Name: Ubuntu 14.04.4 LTS \n \l / x86 . 2016.06.25 14:34:58 - Reading options from /home/jason/.airvpn/AirVPN.xml . 2016.06.25 14:35:01 - Data Path: /home/jason/.airvpn . 2016.06.25 14:35:01 - App Path: /usr/lib/AirVPN . 2016.06.25 14:35:01 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2016.06.25 14:35:01 - Command line arguments (1): path="/home/jason/.airvpn" . 2016.06.25 14:35:01 - Updating systems & servers data ... . 2016.06.25 14:35:01 - Operating System: Unix 3.19.0.62 - Linux jxxxxx-NF110-NF210-NF310 3.19.0-62-generic #70~14.04.1-Ubuntu SMP Mon Jun 13 16:30:45 UTC 2016 i686 i686 i686 GNU/Linux I 2016.06.25 14:35:02 - OpenVPN Driver - Found, /dev/net/tun I 2016.06.25 14:35:02 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2016.06.25 14:35:02 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2016.06.25 14:35:02 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4) ! 2016.06.25 14:35:02 - Activation of Network Lock - Linux IPTables . 2016.06.25 14:35:03 - Systems & servers data update completed I 2016.06.25 14:35:10 - Session starting. W 2016.06.25 14:35:11 - Unable to understand if IPV6 is active. I 2016.06.25 14:35:20 - Checking authorization ... ! 2016.06.25 14:35:20 - Connecting to Caph (Netherlands, Alblasserdam) . 2016.06.25 14:35:20 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2016.06.25 14:35:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.25 14:35:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.25 14:35:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:20 - OpenVPN > Socket Buffers: R=[163840->262144] S=[163840->262144] . 2016.06.25 14:35:20 - OpenVPN > UDPv4 link local: [undef] . 2016.06.25 14:35:20 - OpenVPN > UDPv4 link remote: [AF_INET]xxxxxxxxxxx:443 . 2016.06.25 14:35:20 - OpenVPN > TLS: Initial packet from [AF_INET]xxxxxxx:443, sid=1956d2fc 892e7873 . 2016.06.25 14:35:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.25 14:35:20 - OpenVPN > Validating certificate key usage . 2016.06.25 14:35:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.25 14:35:20 - OpenVPN > VERIFY KU OK . 2016.06.25 14:35:20 - OpenVPN > Validating certificate extended key usage . 2016.06.25 14:35:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.25 14:35:20 - OpenVPN > VERIFY EKU OK . 2016.06.25 14:35:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.25 14:35:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:35:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:35:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:35:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.06.25 14:35:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443 . 2016.06.25 14:35:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.25 14:35:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.210 255.255.0.0' . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.25 14:35:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.25 14:35:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlan0 HWADDR=00:1b:b1:a7:7b:88 . 2016.06.25 14:35:29 - OpenVPN > TUN/TAP device tun0 opened . 2016.06.25 14:35:29 - OpenVPN > TUN/TAP TX queue length set to 100 . 2016.06.25 14:35:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.25 14:35:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2016.06.25 14:35:29 - OpenVPN > /sbin/ip addr add dev tun0 10.4.27.210/16 broadcast 10.4.255.255 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add xxxxxxxx32 via xxx.xxx.1.1 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:35:34 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:35:34 - Starting Management Interface . 2016.06.25 14:35:34 - OpenVPN > Initialization Sequence Completed I 2016.06.25 14:35:34 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup I 2016.06.25 14:35:34 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) I 2016.06.25 14:35:34 - Flushing DNS I 2016.06.25 14:35:34 - Checking DNS W 2016.06.25 14:36:05 - The request timed out ! 2016.06.25 14:36:05 - Disconnecting . 2016.06.25 14:36:05 - Management - Send 'signal SIGTERM' . 2016.06.25 14:36:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.25 14:36:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.25 14:36:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.25 14:36:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del xxxx.x.xxx.xxxx/32 . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2016.06.25 14:36:10 - Connection terminated. . 2016.06.25 14:36:10 - OpenVPN > /sbin/ip route del 128.0.0.0/1 I 2016.06.25 14:36:10 - DNS of the system restored to original settings (Rename method) . 2016.06.25 14:36:10 - OpenVPN > Closing TUN/TAP interface . 2016.06.25 14:36:11 - OpenVPN > /sbin/ip addr del dev tun0 10.4.27.210/16 . 2016.06.25 14:36:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2016.06.25 14:36:14 - Checking authorization ... ! 2016.06.25 14:36:14 - Connecting to Caph (Netherlands, Alblasserdam) . 2016.06.25 14:36:14 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2016.06.25 14:36:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.25 14:36:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.25 14:36:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:14 - OpenVPN > Socket Buffers: R=[163840->262144] S=[163840->262144] . 2016.06.25 14:36:14 - OpenVPN > UDPv4 link local: [undef] . 2016.06.25 14:36:14 - OpenVPN > UDPv4 link remote: [AF_INET]xxxx.xxxx.xxx:443 . 2016.06.25 14:36:14 - OpenVPN > TLS: Initial packet from [AF_INET]xxxx.xxxx.xxx.169:443, sid=44c2f999 66c0a46c . 2016.06.25 14:36:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.25 14:36:14 - OpenVPN > Validating certificate key usage . 2016.06.25 14:36:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.25 14:36:14 - OpenVPN > VERIFY KU OK . 2016.06.25 14:36:14 - OpenVPN > Validating certificate extended key usage . 2016.06.25 14:36:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.25 14:36:14 - OpenVPN > VERIFY EKU OK . 2016.06.25 14:36:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.25 14:36:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:36:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.25 14:36:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.25 14:36:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.06.25 14:36:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443 . 2016.06.25 14:36:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.25 14:36:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.210 255.255.0.0' . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.25 14:36:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.25 14:36:23 - OpenVPN > ROUTE_GATEWAY 1xxx.xxx.xx1.1/255.255.255.0 IFACE=wlan0 HWADDR=00:1b:b1:a7:7b:88 . 2016.06.25 14:36:23 - OpenVPN > TUN/TAP device tun0 opened . 2016.06.25 14:36:23 - OpenVPN > TUN/TAP TX queue length set to 100 . 2016.06.25 14:36:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.25 14:36:23 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2016.06.25 14:36:23 - OpenVPN > /sbin/ip addr add dev tun0 10.4.27.210/16 broadcast 10.4.255.255 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add xxx.xxx.xxx/32 via 192.168.1.1 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:36:28 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2016.06.25 14:36:28 - Starting Management Interface . 2016.06.25 14:36:28 - OpenVPN > Initialization Sequence Completed I 2016.06.25 14:36:28 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup I 2016.06.25 14:36:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) I 2016.06.25 14:36:28 - Flushing DNS I 2016.06.25 14:36:28 - Checking DNS W 2016.06.25 14:37:14 - The request timed out ! 2016.06.25 14:37:14 - Disconnecting . 2016.06.25 14:37:14 - Management - Send 'signal SIGTERM' . 2016.06.25 14:37:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.25 14:37:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.25 14:37:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del xxxx.xxxx.xxxx/32 . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2016.06.25 14:37:19 - OpenVPN > Closing TUN/TAP interface . 2016.06.25 14:37:19 - OpenVPN > /sbin/ip addr del dev tun0 10.4.27.210/16 . 2016.06.25 14:37:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.25 14:37:19 - Connection terminated. I 2016.06.25 14:37:19 - DNS of the system restored to original settings (Rename method) )
  15. What do you think about IVPN encryption, amount of servers, policies and any other comments about three servce. Here is the encryption they use, I got this information from the logs when I connected to there VPN Edit. tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Here is there website https://www.ivpn.net
  16. Hi Forum, I am new to the AirVPN Service. It got my attention because it is one of the few service offering many alternative connection options if an ISP, Admin or Firewall blocks VPN connections. One of which would be the SSL Tunnel for Port 443. Using the recommended server option this connection works but I tried to connect to a server in Europe, for example all German servers as well as one in Austria and the connection failed. Switching to one in Canada the connection worked flawlessly. Now even some servers in Canada do not work. What can cause this issue? I have attached my log files. AirVPN_20160621_122918.txt
  17. Hi, I'm a new user of AirPVN and I can't find a solution to my problem : I'm a Windows 10 user, and sometimes I might have to use an internet connection without the AirVPN, I have also the Internet Lock enable when I use AirVPN. But even after exiting properly AirVPN (disconnect to the server and then click on "Disable Internet Lock") I can't reach internet, seems like I don't successfully close the Internet Lock, any idea ? Thanks !
  18. When connected to a Server my speed drops down to 0B/s for either Upload, Download, and mostly Both. Don't know whether this is a fault via my School Campus or the VPN itself. I've been using SSH Tunnel port 53. These random speed drops produce no log entries however logs are included below Speed graph included in Screenshot below. Any Help appreciated! Thanks AirVPN_20160607_145551.txt
  19. I need help creating a vpn profile so that I can use vpn always on, on iOS. I read this article but still am having problems connecting. Please help http://simonguest.com/2013/03/22/on-demand-vpn-using-openvpn-for-ios/
  20. Some of the popular vpn's pre-shared Secret keys. Read this article talking about there simple keys. https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa
  21. Hi iam getting a Bsod with Netio.sys when i use the vpn or short after i used it. any idea ? Win 10 pro 64bit intel it 4670 16gb ram amd radeon r9 390 8gb vram 1 ssd as OS and 2 hdd AV is avast running by that Adguard PRO steam Raptr ( amd evolved ) and after burner ( no oc )
  22. Hello everyone, I have AirVPN installed on a second desktop of mine, and I'm having an odd problem with it. I can connect to AirVPN servers fine and get acceptable speeds, however, when I shut down the VPN, I can no longer connect to the internet. So, I need to be connected to some VPN server to be able to connect to the internet. I suspect this is due to a bug with the Network Lock feature, which I'm using on both desktops (one of which is not having any problems). Both desktops are connected to the save network via Ethernet cable. I tried disabling network lock on the afflicted desktop, but had no results. I also tried uninstalling AirVPN (and restarting the PC), which also did not help. Is this a known bug, or perhaps something entirely different? I tried searching online for a solution, but all I get are threads about people not being able to connect with a VPN, not without. Thanks in advance!
  23. Is it possible for AirVPN to purchase a server in South Korea?, i have read that their average internet speeds are even faster than Europe. Is there unsuitable laws for them to operate there? I personally do not live in China or Australia, but i do wonder if a VPN endpoint there could provide more bandwidth that is faster. http://tinyurl.com/ptc6s5y
  24. Is it possible that staff could invest in either more Latvian servers or more bandwidth? The current 100 mb/s seems to get filled up quite a bit every so often and it can become irritating. I'm not sure what the bandwidth costs are but it would be a nice addition considering there is more European bandwidth being used than American Bandwidth.
  25. I'm on a mac. ! 2016.04.01 16:01:50 - Disconnecting. 2016.04.01 16:01:50 - Connection terminated.I 2016.04.01 16:01:51 - Cancel requested.I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:01:51 - Session terminated.I 2016.04.01 16:03:02 - Session starting.I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:02 - Checking authorization ...! 2016.04.01 16:03:03 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:03 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:03 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:03 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:03 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:03 - SSH > debug1: Connection established.. 2016.04.01 16:03:03 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key type -1. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key-cert type -1. 2016.04.01 16:03:03 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:03 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:03 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:03 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:03 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:03 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:04 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:04 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:04 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:04 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:04 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:06 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:06 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:06 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key. 2016.04.01 16:03:06 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:06 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:06 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:06 - SSH > debug1: Local connections to LOCALHOST:15677 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:06 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on ::1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:06 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:06 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:06 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:06 - Disconnecting. 2016.04.01 16:03:06 - Connection terminated.I 2016.04.01 16:03:09 - Checking authorization ...! 2016.04.01 16:03:10 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:10 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:10 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:10 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:10 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:10 - SSH > debug1: Connection established.. 2016.04.01 16:03:10 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key type -1. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key-cert type -1. 2016.04.01 16:03:10 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:10 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:10 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:10 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:10 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:11 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:11 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:11 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:11 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:11 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:11 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:12 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:12 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:12 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key. 2016.04.01 16:03:12 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:12 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:12 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:12 - SSH > debug1: Local connections to LOCALHOST:56237 forwarded to remote address 127.0.0.1:2018! 2016.04.01 16:03:12 - Disconnecting. 2016.04.01 16:03:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:12 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on ::1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:12 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:12 - Connection terminated.I 2016.04.01 16:03:15 - Checking authorization ...! 2016.04.01 16:03:16 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:16 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:16 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:16 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:16 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:16 - SSH > debug1: Connection established.. 2016.04.01 16:03:16 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key type -1. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key-cert type -1. 2016.04.01 16:03:16 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:16 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:16 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:16 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:16 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:17 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:17 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:17 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:17 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:17 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:17 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:17 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:17 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:17 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key. 2016.04.01 16:03:17 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:18 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:18 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:18 - SSH > debug1: Local connections to LOCALHOST:7656 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:18 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:18 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:18 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on ::1 port 7656.! 2016.04.01 16:03:18 - Disconnecting. 2016.04.01 16:03:18 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 7656.. 2016.04.01 16:03:18 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:18 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:18 - Connection terminated.I 2016.04.01 16:03:20 - Cancel requested.I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:03:20 - Session terminated.I 2016.04.01 16:03:57 - Session starting.I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:57 - Checking authorization ...! 2016.04.01 16:03:57 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:58 - Disconnecting. 2016.04.01 16:03:58 - Connection terminated.I 2016.04.01 16:04:01 - Cancel requested.I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:04:01 - Session terminated.I 2016.04.01 16:05:43 - Session starting.I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:05:44 - Checking authorization ...! 2016.04.01 16:05:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:44 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:44 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:44 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:44 - Disconnecting. 2016.04.01 16:05:44 - Connection terminated.I 2016.04.01 16:05:47 - Checking authorization ...! 2016.04.01 16:05:47 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:47 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:47 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:48 - Disconnecting. 2016.04.01 16:05:48 - Connection terminated.I 2016.04.01 16:05:51 - Checking authorization ...! 2016.04.01 16:05:51 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:51 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:51 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:51 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:51 - Disconnecting. 2016.04.01 16:05:51 - Connection terminated.I 2016.04.01 16:05:54 - Checking authorization ...! 2016.04.01 16:05:54 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:54 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:54 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:54 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:54 - Disconnecting. 2016.04.01 16:05:54 - Connection terminated.I 2016.04.01 16:05:57 - Checking authorization ...! 2016.04.01 16:05:58 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:58 - Disconnecting. 2016.04.01 16:05:58 - Connection terminated.I 2016.04.01 16:06:01 - Checking authorization ...! 2016.04.01 16:06:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:01 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:01 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:01 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:01 - Disconnecting. 2016.04.01 16:06:01 - Connection terminated.I 2016.04.01 16:06:04 - Checking authorization ...! 2016.04.01 16:06:05 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:05 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:05 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:05 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:05 - Disconnecting. 2016.04.01 16:06:05 - Connection terminated.I 2016.04.01 16:06:08 - Checking authorization ...! 2016.04.01 16:06:08 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:08 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:08 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:08 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:08 - Disconnecting. 2016.04.01 16:06:08 - Connection terminated.I 2016.04.01 16:06:11 - Checking authorization ...! 2016.04.01 16:06:12 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:12 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:12 - Disconnecting. 2016.04.01 16:06:12 - Connection terminated.I 2016.04.01 16:06:15 - Checking authorization ...! 2016.04.01 16:06:15 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:15 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:15 - Disconnecting. 2016.04.01 16:06:15 - Connection terminated.I 2016.04.01 16:06:18 - Checking authorization ...! 2016.04.01 16:06:19 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:19 - Disconnecting. 2016.04.01 16:06:19 - Connection terminated.I 2016.04.01 16:06:22 - Checking authorization ...! 2016.04.01 16:06:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:22 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:22 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:22 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:22 - Disconnecting. 2016.04.01 16:06:22 - Connection terminated.I 2016.04.01 16:06:25 - Checking authorization ...I 2016.04.01 16:06:26 - Cancel requested.I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:26 - Session terminated.I 2016.04.01 16:06:27 - Session starting.I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:06:27 - Checking authorization ...! 2016.04.01 16:06:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:28 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:28 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:28 - Disconnecting. 2016.04.01 16:06:28 - Connection terminated.I 2016.04.01 16:06:31 - Checking authorization ...! 2016.04.01 16:06:32 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:32 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:32 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:32 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:32 - Disconnecting. 2016.04.01 16:06:32 - Connection terminated.I 2016.04.01 16:06:35 - Checking authorization ...! 2016.04.01 16:06:35 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:35 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:35 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:35 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:35 - Disconnecting. 2016.04.01 16:06:35 - Connection terminated.I 2016.04.01 16:06:38 - Checking authorization ...! 2016.04.01 16:06:38 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:38 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:38 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:38 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:38 - Disconnecting. 2016.04.01 16:06:38 - Connection terminated.I 2016.04.01 16:06:41 - Checking authorization ...! 2016.04.01 16:06:42 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:42 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:42 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:42 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:42 - Disconnecting. 2016.04.01 16:06:42 - Connection terminated.I 2016.04.01 16:06:45 - Checking authorization ...! 2016.04.01 16:06:45 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:45 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:45 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:45 - Disconnecting. 2016.04.01 16:06:45 - Connection terminated.I 2016.04.01 16:06:47 - Cancel requested.I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:48 - Session terminated.I 2016.04.01 16:07:10 - Session starting.I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:07:11 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:07:11 - Checking authorization ...! 2016.04.01 16:07:11 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:11 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:11 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:11 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:11 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:11 - SSH > debug1: Connection established.. 2016.04.01 16:07:11 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key type -1. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key-cert type -1. 2016.04.01 16:07:11 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:11 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:11 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:11 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:11 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:12 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:12 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:12 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:12 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:12 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:12 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:13 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:13 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:13 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:13 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key. 2016.04.01 16:07:13 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:13 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:13 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:13 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:13 - SSH > debug1: Local connections to LOCALHOST:24160 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on ::1 port 24160.. 2016.04.01 16:07:13 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:13 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:13 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 24160.. 2016.04.01 16:07:13 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:13 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:07:13 - Disconnecting. 2016.04.01 16:07:13 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:13 - Connection terminated.I 2016.04.01 16:07:16 - Checking authorization ...! 2016.04.01 16:07:17 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:17 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:17 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:17 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:17 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:17 - SSH > debug1: Connection established.. 2016.04.01 16:07:17 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key type -1. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key-cert type -1. 2016.04.01 16:07:17 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:17 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:18 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:18 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:18 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:18 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:18 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:18 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:18 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:18 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:19 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:19 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:19 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:19 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key. 2016.04.01 16:07:19 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:19 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:19 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:19 - SSH > debug1: Local connections to LOCALHOST:2570 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on ::1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:19 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:19 - Disconnecting. 2016.04.01 16:07:19 - Connection terminated.I 2016.04.01 16:07:22 - Checking authorization ...! 2016.04.01 16:07:23 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:23 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:23 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:23 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:23 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:23 - SSH > debug1: Connection established.. 2016.04.01 16:07:23 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key type -1. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key-cert type -1. 2016.04.01 16:07:23 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:23 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:24 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:24 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:24 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:24 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:24 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:25 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:25 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:25 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key. 2016.04.01 16:07:25 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:25 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:25 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:25 - SSH > debug1: Local connections to LOCALHOST:22654 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on ::1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:25 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:25 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:25 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:25 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:25 - Disconnecting. 2016.04.01 16:07:25 - Connection terminated.I 2016.04.01 16:07:28 - Checking authorization ...! 2016.04.01 16:07:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:28 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:28 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:28 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:28 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:28 - SSH > debug1: Connection established.. 2016.04.01 16:07:28 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key type -1. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key-cert type -1. 2016.04.01 16:07:28 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:28 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:29 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:29 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:29 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:29 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:29 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:29 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:29 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:29 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:30 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:30 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:30 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:30 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key. 2016.04.01 16:07:30 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:30 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:30 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:30 - SSH > debug1: Local connections to LOCALHOST:2708 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:30 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on ::1 port 2708.. 2016.04.01 16:07:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:30 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2708.. 2016.04.01 16:07:30 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:30 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:30 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:30 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:30 - Disconnecting. 2016.04.01 16:07:30 - Connection terminated.I 2016.04.01 16:07:34 - Checking authorization ...! 2016.04.01 16:07:34 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:34 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:34 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:34 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:34 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:34 - SSH > debug1: Connection established.. 2016.04.01 16:07:34 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key type -1. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key-cert type -1. 2016.04.01 16:07:34 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:34 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:34 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:34 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:34 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:34 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:35 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:35 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:35 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:35 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:35 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:35 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:35 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:35 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key. 2016.04.01 16:07:35 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:36 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:36 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:36 - SSH > debug1: Local connections to LOCALHOST:28938 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on ::1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:36 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:36 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:36 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:36 - Disconnecting. 2016.04.01 16:07:36 - Connection terminated.I 2016.04.01 16:07:39 - Checking authorization ...! 2016.04.01 16:07:39 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:39 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:39 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:39 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:39 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:39 - SSH > debug1: Connection established.. 2016.04.01 16:07:39 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key type -1. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key-cert type -1. 2016.04.01 16:07:39 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:39 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:39 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:39 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:39 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:40 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:40 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:40 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:40 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:40 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:40 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:41 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:41 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:41 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:41 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key. 2016.04.01 16:07:41 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:41 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:41 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:41 - SSH > debug1: Local connections to LOCALHOST:13284 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on ::1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:41 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:41 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:41 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:41 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:41 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:41 - Disconnecting. 2016.04.01 16:07:41 - Connection terminated.I 2016.04.01 16:07:44 - Checking authorization ...! 2016.04.01 16:07:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:45 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:45 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:45 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:45 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:45 - SSH > debug1: Connection established.. 2016.04.01 16:07:45 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key type -1. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key-cert type -1. 2016.04.01 16:07:45 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:45 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:45 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:45 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:45 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:46 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:46 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:46 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:46 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:46 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:46 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:46 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:46 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:46 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key. 2016.04.01 16:07:46 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:46 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:46 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:46 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:46 - SSH > debug1: Local connections to LOCALHOST:17898 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on ::1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:46 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:46 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:46 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:46 - Disconnecting. 2016.04.01 16:07:47 - Connection terminated.I 2016.04.01 16:07:50 - Checking authorization ...! 2016.04.01 16:07:50 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:50 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:50 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:50 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:50 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:50 - SSH > debug1: Connection established.. 2016.04.01 16:07:50 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key type -1. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key-cert type -1. 2016.04.01 16:07:50 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:50 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:50 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:50 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:50 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:51 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:51 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:51 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:51 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:51 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:51 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:52 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:52 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:52 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key. 2016.04.01 16:07:52 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:52 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:52 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:52 - SSH > debug1: Local connections to LOCALHOST:56837 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on ::1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:52 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:52 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:52 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:52 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:52 - Disconnecting. 2016.04.01 16:07:52 - Connection terminated.I 2016.04.01 16:07:55 - Checking authorization ...! 2016.04.01 16:07:55 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:55 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:55 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:55 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:55 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:55 - SSH > debug1: Connection established.. 2016.04.01 16:07:55 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key type -1. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key-cert type -1. 2016.04.01 16:07:55 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:55 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:56 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:56 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:56 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:56 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:56 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:56 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:56 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:56 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:57 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:57 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:57 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:57 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key. 2016.04.01 16:07:57 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:57 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:57 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:57 - SSH > debug1: Local connections to LOCALHOST:25992 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on ::1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:57 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:57 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:57 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:57 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:57 - Disconnecting. 2016.04.01 16:07:57 - Connection terminated.I 2016.04.01 16:08:00 - Checking authorization ...! 2016.04.01 16:08:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:08:01 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:08:01 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:08:01 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:08:01 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:08 - SSH > debug1: Connection established.. 2016.04.01 16:09:08 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key type -1. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key-cert type -1. 2016.04.01 16:09:08 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:08 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:08 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:08 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:08 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:09 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:09 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:09 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:09 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:09 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:09 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:09 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:09 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:09 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key. 2016.04.01 16:09:09 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:09 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:10 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:10 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:10 - SSH > debug1: Local connections to LOCALHOST:9956 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on ::1 port 9956.. 2016.04.01 16:09:10 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:10 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:10 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 9956.. 2016.04.01 16:09:10 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:10 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:09:10 - Disconnecting. 2016.04.01 16:09:10 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:10 - Connection terminated.I 2016.04.01 16:09:13 - Checking authorization ...! 2016.04.01 16:09:13 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:13 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:13 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:13 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:13 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:13 - SSH > debug1: Connection established.. 2016.04.01 16:09:13 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key type -1. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key-cert type -1. 2016.04.01 16:09:13 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:13 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:13 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:13 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:14 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:14 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:14 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:14 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:14 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:14 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:15 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:15 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:15 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:15 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key. 2016.04.01 16:09:15 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:15 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:15 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:15 - SSH > debug1: Local connections to LOCALHOST:34435 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on ::1 port 34435.. 2016.04.01 16:09:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:15 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:15 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 34435.. 2016.04.01 16:09:15 - SSH > debug1: channel 1: new [port listener]! 2016.04.01 16:09:15 - Disconnecting. 2016.04.01 16:09:15 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:15 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:15 - Connection terminated.I 2016.04.01 16:09:18 - Checking authorization ...I 2016.04.01 16:09:19 - Cancel requested.I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:09:19 - Session terminated.I 2016.04.01 16:09:21 - Session starting.I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:09:22 - Checking authorization ...! 2016.04.01 16:09:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:22 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:22 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:22 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:22 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:22 - SSH > debug1: Connection established.. 2016.04.01 16:09:22 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key type -1. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key-cert type -1. 2016.04.01 16:09:22 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:22 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:23 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:23 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:23 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:23 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:23 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:24 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:24 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:24 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key. 2016.04.01 16:09:24 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:24 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:24 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:24 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:24 - SSH > debug1: Local connections to LOCALHOST:40961 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on ::1 port 40961.. 2016.04.01 16:09:24 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:24 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:24 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 40961.. 2016.04.01 16:09:24 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:24 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:24 - SSH > debug1: Entering interactive session.! 2016.04.01 16:09:24 - Disconnecting. 2016.04.01 16:09:24 - Connection terminated.
×
×
  • Create New...