Jump to content
Not connected, Your IP: 34.238.143.70

Search the Community

Showing results for tags 'network lock'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 92 results

  1. Hello everyone! This is my first post, so keep that in mind. Also, while I have better-than-average I.T. skills, I'm hardly an expert. I have recently encountered several problems, all of which I did not notice until after I installed the Windows 10 Fall Creators Update. Note that that does not necessarily mean they weren't present before the update; I just didn't notice them until afterwards. I also have some other questions. 1. If I open Eddie and activate network lock, remain unconnected to a server, attempt to load a webpage, and it doesn't work -- does that definitively mean that Network Lock is working and secure? (Assuming, of course, that it does work with network lock deactivated.) 2. I keep getting the message, "Recovery. Unexpected Crash?" (the question mark is part of the message). 3. I keep getting this message too: "The requested protocol has not been configured into the system, or no implementation for it exists." 4. If I run ipleak.net while connected to an AirVPN server, and: my IPv4 is the AirVPN server, no forwarded IP is detected, IPv6 test is not reachable, RTCPeerConnection is not available, and the DNS addresses are all AirVPN servers -- then am I definitively secured? 5. It appears IPv6 doesn't work (I get the "IPv6 test not reachable" message on ipleak.net) at all times, even if I'm not running Eddie. This was not the case when I first installed and set up Eddie. Toggling Eddie's "Disable IPv6 at OS level if requested" option doesn't seem to make a difference. 6. In Eddie's preferences, under Advanced, for the IPv6 dropdown menu, what's the difference between "None" and "Disable"? 7. What does "Force TAP interface UP" mean? I probably won't have time to check this thread again until Sunday. Thanks a bunch!
  2. Im having some issues with Eddie 2.13.6 not being able to connect to any servers while the network lock is activated. Its getting stuck on checking route and just keeps trying each recommended server going down the list. Im running MAC OSX Sierra. Any suggestions would be greatly appreciated. Everything seems to work fine when the network lock is not activated. Ive pasted the log below. Thank you in advance for any insigt.. I 2017.11.07 17:33:35 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.12.6, Version: Darwin Richards-MacBook-Pro.local 16.7.0 Darwin Kernel Version 16.7.0: Thu Jun 15 17:36:27 PDT 2017; root:xnu-3789.70.16~2/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319. 2017.11.07 17:33:35 - Reading options from /Users/RicksMacbookPro/.airvpn/AirVPN.xml. 2017.11.07 17:33:36 - Command line arguments (1): gui.osx.style="dark"I 2017.11.07 17:33:37 - OpenVPN Driver - ExpectedI 2017.11.07 17:33:37 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)I 2017.11.07 17:33:38 - SSH - Version: OpenSSH_7.4p1, LibreSSL 2.5.0 (/usr/bin/ssh)I 2017.11.07 17:33:38 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)I 2017.11.07 17:33:38 - curl - Version: 7.54.0 (/usr/bin/curl)I 2017.11.07 17:33:38 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/cacert.pem. 2017.11.07 17:33:38 - Updating systems & servers data ...! 2017.11.07 17:33:38 - Ready. 2017.11.07 17:33:39 - Systems & servers data update completedI 2017.11.07 17:33:41 - Checking login ...! 2017.11.07 17:33:42 - Logged in.! 2017.11.07 17:33:45 - Activation of Network Lock - OS X - PF. 2017.11.07 17:33:45 - OS X - PF rules updated, reloadingI 2017.11.07 17:33:46 - Session starting.. 2017.11.07 17:33:47 - IPv6 disabled on network adapter (Bluetooth DUN). 2017.11.07 17:33:47 - IPv6 disabled on network adapter (iPhone USB). 2017.11.07 17:33:47 - IPv6 disabled on network adapter (Wi-Fi). 2017.11.07 17:33:47 - IPv6 disabled on network adapter (Bluetooth PAN). 2017.11.07 17:33:47 - IPv6 disabled on network adapter (Thunderbolt Bridge). 2017.11.07 17:33:47 - IPv6 disabled on network adapter (ibVPN-L2TP). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 2). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 3). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 4). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 5). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 6). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 7). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 8). 2017.11.07 17:33:48 - IPv6 disabled on network adapter (ibVPN-L2TP 9). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 10). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 11). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 12). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 13). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 14). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 15). 2017.11.07 17:33:49 - IPv6 disabled on network adapter (ibVPN-L2TP 16). 2017.11.07 17:33:50 - IPv6 disabled on network adapter (ibVPN-L2TP 17)I 2017.11.07 17:33:53 - Checking authorization ...! 2017.11.07 17:33:53 - Connecting to Homam (Canada, Vancouver). 2017.11.07 17:33:53 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2017.11.07 17:33:53 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2017.11.07 17:33:53 - Connection to OpenVPN Management Interface. 2017.11.07 17:33:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3116. 2017.11.07 17:33:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:33:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:33:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.26:443. 2017.11.07 17:33:54 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.11.07 17:33:54 - OpenVPN > UDP link local: (not bound). 2017.11.07 17:33:54 - OpenVPN > UDP link remote: [AF_INET]71.19.252.26:443. 2017.11.07 17:33:54 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.26:443, sid=3a3110c3 751b0ed9. 2017.11.07 17:33:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.11.07 17:33:54 - OpenVPN > VERIFY KU OK. 2017.11.07 17:33:54 - OpenVPN > Validating certificate extended key usage. 2017.11.07 17:33:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.11.07 17:33:54 - OpenVPN > VERIFY EKU OK. 2017.11.07 17:33:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Homam, emailAddress=info@airvpn.org. 2017.11.07 17:33:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3116. 2017.11.07 17:33:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.11.07 17:33:54 - OpenVPN > [Homam] Peer Connection Initiated with [AF_INET]71.19.252.26:443. 2017.11.07 17:33:55 - OpenVPN > SENT CONTROL [Homam]: 'PUSH_REQUEST' (status=1). 2017.11.07 17:33:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.128 255.255.0.0,peer-id 10,cipher AES-256-GCM'. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.11.07 17:33:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.11.07 17:33:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2017.11.07 17:33:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:33:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:33:55 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=54:26:96:dd:a1:31. 2017.11.07 17:33:55 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.11.07 17:33:55 - OpenVPN > Opened utun device utun1. 2017.11.07 17:33:55 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.11.07 17:33:55 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.11.07 17:33:55 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.11.07 17:33:55 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.11.07 17:33:55 - OpenVPN > /sbin/ifconfig utun1 10.4.4.128 10.4.4.128 netmask 255.255.0.0 mtu 1500 up. 2017.11.07 17:33:55 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.4.128 255.255.0.0. 2017.11.07 17:33:55 - OpenVPN > add net 10.4.0.0: gateway 10.4.4.128. 2017.11.07 17:33:55 - OpenVPN > /sbin/route add -net 71.19.252.26 192.168.0.1 255.255.255.255. 2017.11.07 17:33:55 - OpenVPN > add net 71.19.252.26: gateway 192.168.0.1. 2017.11.07 17:33:55 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:33:55 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.11.07 17:33:55 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:33:55 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.11.07 17:33:55 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1). 2017.11.07 17:33:57 - DNS of a network adapter forced (ibVPN-L2TP 14, from Automatic to 10.4.0.1). 2017.11.07 17:33:57 - DNS of a network adapter forced (ibVPN-L2TP 15, from Automatic to 10.4.0.1). 2017.11.07 17:33:57 - DNS of a network adapter forced (ibVPN-L2TP 16, from Automatic to 10.4.0.1). 2017.11.07 17:33:57 - DNS of a network adapter forced (ibVPN-L2TP 17, from Automatic to 10.4.0.1). 2017.11.07 17:33:57 - Flushing DNS. 2017.11.07 17:33:57 - OS X - PF rules updated, reloadingI 2017.11.07 17:33:57 - Checking routeI 2017.11.07 17:33:58 - Checking DNS. 2017.11.07 17:34:10 - Checking DNS failed: eukphbvnwmbbukqyqdvuaginqxektwnv. 2017.11.07 17:34:10 - Checking DNS (2° try). 2017.11.07 17:34:18 - Checking DNS failed: eukphbvnwmbbukqyqdvuaginqxektwnv. 2017.11.07 17:34:18 - Checking DNS (3° try). 2017.11.07 17:34:21 - Checking DNS failed: eukphbvnwmbbukqyqdvuaginqxektwnvE 2017.11.07 17:34:21 - Checking DNS failed.. 2017.11.07 17:34:21 - OpenVPN > Initialization Sequence Completed! 2017.11.07 17:34:21 - Disconnecting. 2017.11.07 17:34:21 - Sending management termination signal. 2017.11.07 17:34:21 - Management - Send 'signal SIGTERM'. 2017.11.07 17:34:26 - Connection terminated.. 2017.11.07 17:34:27 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2017.11.07 17:34:27 - DNS of a network adapter restored to original settings (ibVPN-L2TP 14, to Automatic). 2017.11.07 17:34:27 - DNS of a network adapter restored to original settings (ibVPN-L2TP 15, to Automatic). 2017.11.07 17:34:27 - DNS of a network adapter restored to original settings (ibVPN-L2TP 16, to Automatic). 2017.11.07 17:34:27 - DNS of a network adapter restored to original settings (ibVPN-L2TP 17, to Automatic)I 2017.11.07 17:34:30 - Checking authorization ...! 2017.11.07 17:34:30 - Connecting to Kleeia (Canada, Vancouver). 2017.11.07 17:34:31 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2017.11.07 17:34:31 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2017.11.07 17:34:31 - Connection to OpenVPN Management Interface. 2017.11.07 17:34:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3116. 2017.11.07 17:34:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:34:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:34:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443. 2017.11.07 17:34:31 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.11.07 17:34:31 - OpenVPN > UDP link local: (not bound). 2017.11.07 17:34:31 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443. 2017.11.07 17:34:31 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=4d4d399b 6ca84467. 2017.11.07 17:34:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3116. 2017.11.07 17:34:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.11.07 17:34:31 - OpenVPN > VERIFY KU OK. 2017.11.07 17:34:31 - OpenVPN > Validating certificate extended key usage. 2017.11.07 17:34:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.11.07 17:34:31 - OpenVPN > VERIFY EKU OK. 2017.11.07 17:34:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org. 2017.11.07 17:34:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.11.07 17:34:31 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443. 2017.11.07 17:34:32 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1). 2017.11.07 17:34:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.86 255.255.0.0,peer-id 63,cipher AES-256-GCM'. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.11.07 17:34:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.11.07 17:34:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2017.11.07 17:34:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:34:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:34:32 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=54:26:96:dd:a1:31. 2017.11.07 17:34:32 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.11.07 17:34:32 - OpenVPN > Opened utun device utun1. 2017.11.07 17:34:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.11.07 17:34:32 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.11.07 17:34:32 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.11.07 17:34:32 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.11.07 17:34:32 - OpenVPN > /sbin/ifconfig utun1 10.4.1.86 10.4.1.86 netmask 255.255.0.0 mtu 1500 up. 2017.11.07 17:34:32 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.86 255.255.0.0. 2017.11.07 17:34:32 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.86. 2017.11.07 17:34:32 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.0.1 255.255.255.255. 2017.11.07 17:34:32 - OpenVPN > add net 71.19.252.31: gateway 192.168.0.1. 2017.11.07 17:34:32 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:34:32 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.11.07 17:34:32 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:34:32 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.11.07 17:34:32 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1). 2017.11.07 17:34:33 - DNS of a network adapter forced (ibVPN-L2TP 14, from Automatic to 10.4.0.1). 2017.11.07 17:34:34 - DNS of a network adapter forced (ibVPN-L2TP 15, from Automatic to 10.4.0.1). 2017.11.07 17:34:34 - DNS of a network adapter forced (ibVPN-L2TP 16, from Automatic to 10.4.0.1). 2017.11.07 17:34:34 - DNS of a network adapter forced (ibVPN-L2TP 17, from Automatic to 10.4.0.1). 2017.11.07 17:34:34 - Flushing DNSI 2017.11.07 17:34:34 - Checking route. 2017.11.07 17:35:04 - curl: (28) Connection timed out after 30000 milliseconds. 2017.11.07 17:35:04 - Checking route (2° try). 2017.11.07 17:35:35 - curl: (28) Connection timed out after 30002 milliseconds. 2017.11.07 17:35:35 - Checking route (3° try). 2017.11.07 17:36:07 - curl: (28) Connection timed out after 30001 millisecondsE 2017.11.07 17:36:07 - Checking route failed.. 2017.11.07 17:36:08 - OpenVPN > Initialization Sequence Completed! 2017.11.07 17:36:08 - Disconnecting. 2017.11.07 17:36:08 - Sending management termination signal. 2017.11.07 17:36:08 - Management - Send 'signal SIGTERM'. 2017.11.07 17:36:14 - Connection terminated.. 2017.11.07 17:36:14 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2017.11.07 17:36:14 - DNS of a network adapter restored to original settings (ibVPN-L2TP 14, to Automatic). 2017.11.07 17:36:14 - DNS of a network adapter restored to original settings (ibVPN-L2TP 15, to Automatic). 2017.11.07 17:36:15 - DNS of a network adapter restored to original settings (ibVPN-L2TP 16, to Automatic). 2017.11.07 17:36:15 - DNS of a network adapter restored to original settings (ibVPN-L2TP 17, to Automatic)I 2017.11.07 17:36:18 - Checking authorization ...! 2017.11.07 17:36:19 - Connecting to Cynosura (Canada, Vancouver). 2017.11.07 17:36:19 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2017.11.07 17:36:19 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2017.11.07 17:36:19 - Connection to OpenVPN Management Interface. 2017.11.07 17:36:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3116. 2017.11.07 17:36:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:36:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:36:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2017.11.07 17:36:19 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.11.07 17:36:19 - OpenVPN > UDP link local: (not bound). 2017.11.07 17:36:19 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2017.11.07 17:36:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=85e241fd 2f78a0f2. 2017.11.07 17:36:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.11.07 17:36:20 - OpenVPN > VERIFY KU OK. 2017.11.07 17:36:20 - OpenVPN > Validating certificate extended key usage. 2017.11.07 17:36:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.11.07 17:36:20 - OpenVPN > VERIFY EKU OK. 2017.11.07 17:36:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2017.11.07 17:36:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.11.07 17:36:20 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2017.11.07 17:36:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3116. 2017.11.07 17:36:21 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2017.11.07 17:36:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.52 255.255.0.0,peer-id 62,cipher AES-256-GCM'. 2017.11.07 17:36:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.11.07 17:36:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.11.07 17:36:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.11.07 17:36:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.11.07 17:36:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.11.07 17:36:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.11.07 17:36:22 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.11.07 17:36:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.11.07 17:36:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.11.07 17:36:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2017.11.07 17:36:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:36:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.11.07 17:36:23 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=54:26:96:dd:a1:31. 2017.11.07 17:36:23 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.11.07 17:36:23 - OpenVPN > Opened utun device utun1. 2017.11.07 17:36:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.11.07 17:36:23 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.11.07 17:36:23 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.11.07 17:36:23 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.11.07 17:36:23 - OpenVPN > /sbin/ifconfig utun1 10.4.9.52 10.4.9.52 netmask 255.255.0.0 mtu 1500 up. 2017.11.07 17:36:23 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.52 255.255.0.0. 2017.11.07 17:36:23 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.52. 2017.11.07 17:36:23 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.0.1 255.255.255.255. 2017.11.07 17:36:23 - OpenVPN > add net 71.19.252.21: gateway 192.168.0.1. 2017.11.07 17:36:23 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:36:23 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.11.07 17:36:23 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:36:23 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.11.07 17:36:24 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1). 2017.11.07 17:36:25 - DNS of a network adapter forced (ibVPN-L2TP 14, from Automatic to 10.4.0.1). 2017.11.07 17:36:25 - DNS of a network adapter forced (ibVPN-L2TP 15, from Automatic to 10.4.0.1). 2017.11.07 17:36:25 - DNS of a network adapter forced (ibVPN-L2TP 16, from Automatic to 10.4.0.1). 2017.11.07 17:36:25 - DNS of a network adapter forced (ibVPN-L2TP 17, from Automatic to 10.4.0.1). 2017.11.07 17:36:25 - Flushing DNSI 2017.11.07 17:36:25 - Checking route. 2017.11.07 17:36:56 - curl: (28) Connection timed out after 30000 milliseconds. 2017.11.07 17:36:56 - Checking route (2° try). 2017.11.07 17:37:27 - curl: (28) Connection timed out after 30001 milliseconds. 2017.11.07 17:37:27 - Checking route (3° try). 2017.11.07 17:37:59 - curl: (28) Connection timed out after 30001 millisecondsE 2017.11.07 17:37:59 - Checking route failed.. 2017.11.07 17:37:59 - OpenVPN > Initialization Sequence Completed! 2017.11.07 17:37:59 - Disconnecting. 2017.11.07 17:37:59 - Sending management termination signal. 2017.11.07 17:37:59 - Management - Send 'signal SIGTERM'. 2017.11.07 17:38:04 - Connection terminated.. 2017.11.07 17:38:04 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2017.11.07 17:38:04 - DNS of a network adapter restored to original settings (ibVPN-L2TP 14, to Automatic). 2017.11.07 17:38:04 - DNS of a network adapter restored to original settings (ibVPN-L2TP 15, to Automatic). 2017.11.07 17:38:04 - DNS of a network adapter restored to original settings (ibVPN-L2TP 16, to Automatic). 2017.11.07 17:38:04 - DNS of a network adapter restored to original settings (ibVPN-L2TP 17, to Automatic)I 2017.11.07 17:38:07 - Checking authorization ...! 2017.11.07 17:38:08 - Connecting to Gemma (Canada, Vancouver). 2017.11.07 17:38:08 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2017.11.07 17:38:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2017.11.07 17:38:08 - Connection to OpenVPN Management Interface. 2017.11.07 17:38:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3116. 2017.11.07 17:38:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:38:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:38:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443. 2017.11.07 17:38:08 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.11.07 17:38:08 - OpenVPN > UDP link local: (not bound). 2017.11.07 17:38:08 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443. 2017.11.07 17:38:08 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=b81fa2ce 8b4ee975. 2017.11.07 17:38:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3116. 2017.11.07 17:38:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.11.07 17:38:08 - OpenVPN > VERIFY KU OK. 2017.11.07 17:38:08 - OpenVPN > Validating certificate extended key usage. 2017.11.07 17:38:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.11.07 17:38:08 - OpenVPN > VERIFY EKU OK. 2017.11.07 17:38:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.11.07 17:38:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.11.07 17:38:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2017.11.07 17:38:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.11.07 17:38:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.77 255.255.0.0'. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.11.07 17:38:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.11.07 17:38:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.11.07 17:38:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:38:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.11.07 17:38:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:38:10 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=54:26:96:dd:a1:31. 2017.11.07 17:38:10 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.11.07 17:38:10 - OpenVPN > Opened utun device utun1. 2017.11.07 17:38:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.11.07 17:38:10 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.11.07 17:38:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.11.07 17:38:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.11.07 17:38:10 - OpenVPN > /sbin/ifconfig utun1 10.4.21.77 10.4.21.77 netmask 255.255.0.0 mtu 1500 up. 2017.11.07 17:38:10 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.77 255.255.0.0. 2017.11.07 17:38:10 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.77. 2017.11.07 17:38:10 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.0.1 255.255.255.255. 2017.11.07 17:38:10 - OpenVPN > add net 71.19.252.113: gateway 192.168.0.1. 2017.11.07 17:38:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:38:10 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.11.07 17:38:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:38:10 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.11.07 17:38:10 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1). 2017.11.07 17:38:11 - DNS of a network adapter forced (ibVPN-L2TP 14, from Automatic to 10.4.0.1). 2017.11.07 17:38:11 - DNS of a network adapter forced (ibVPN-L2TP 15, from Automatic to 10.4.0.1). 2017.11.07 17:38:12 - DNS of a network adapter forced (ibVPN-L2TP 16, from Automatic to 10.4.0.1). 2017.11.07 17:38:12 - DNS of a network adapter forced (ibVPN-L2TP 17, from Automatic to 10.4.0.1). 2017.11.07 17:38:12 - Flushing DNSI 2017.11.07 17:38:12 - Checking route. 2017.11.07 17:38:42 - curl: (28) Connection timed out after 30004 milliseconds. 2017.11.07 17:38:42 - Checking route (2° try). 2017.11.07 17:39:13 - curl: (28) Connection timed out after 30001 milliseconds. 2017.11.07 17:39:13 - Checking route (3° try). 2017.11.07 17:39:45 - curl: (28) Connection timed out after 30005 millisecondsE 2017.11.07 17:39:45 - Checking route failed.. 2017.11.07 17:39:45 - OpenVPN > Initialization Sequence Completed! 2017.11.07 17:39:46 - Disconnecting. 2017.11.07 17:39:46 - Sending management termination signal. 2017.11.07 17:39:46 - Management - Send 'signal SIGTERM'. 2017.11.07 17:39:51 - Connection terminated.. 2017.11.07 17:39:51 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2017.11.07 17:39:51 - DNS of a network adapter restored to original settings (ibVPN-L2TP 14, to Automatic). 2017.11.07 17:39:51 - DNS of a network adapter restored to original settings (ibVPN-L2TP 15, to Automatic). 2017.11.07 17:39:51 - DNS of a network adapter restored to original settings (ibVPN-L2TP 16, to Automatic). 2017.11.07 17:39:51 - DNS of a network adapter restored to original settings (ibVPN-L2TP 17, to Automatic)I 2017.11.07 17:39:54 - Checking authorization ...! 2017.11.07 17:39:55 - Connecting to Aludra (Canada, Toronto, Ontario). 2017.11.07 17:39:55 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2017.11.07 17:39:55 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2017.11.07 17:39:55 - Connection to OpenVPN Management Interface. 2017.11.07 17:39:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3116. 2017.11.07 17:39:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:39:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:39:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.202:443. 2017.11.07 17:39:55 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.11.07 17:39:55 - OpenVPN > UDP link local: (not bound). 2017.11.07 17:39:55 - OpenVPN > UDP link remote: [AF_INET]104.254.90.202:443. 2017.11.07 17:39:55 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=78c1ba87 4e29bc97. 2017.11.07 17:39:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3116. 2017.11.07 17:39:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.11.07 17:39:55 - OpenVPN > VERIFY KU OK. 2017.11.07 17:39:55 - OpenVPN > Validating certificate extended key usage. 2017.11.07 17:39:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.11.07 17:39:55 - OpenVPN > VERIFY EKU OK. 2017.11.07 17:39:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.11.07 17:39:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.11.07 17:39:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443. 2017.11.07 17:39:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.11.07 17:39:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.11 255.255.0.0'. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.11.07 17:39:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.11.07 17:39:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.11.07 17:39:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:39:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.11.07 17:39:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.11.07 17:39:57 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=54:26:96:dd:a1:31. 2017.11.07 17:39:57 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.11.07 17:39:57 - OpenVPN > Opened utun device utun1. 2017.11.07 17:39:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.11.07 17:39:57 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.11.07 17:39:57 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.11.07 17:39:57 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.11.07 17:39:57 - OpenVPN > /sbin/ifconfig utun1 10.4.64.11 10.4.64.11 netmask 255.255.0.0 mtu 1500 up. 2017.11.07 17:39:57 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.64.11 255.255.0.0. 2017.11.07 17:39:57 - OpenVPN > add net 10.4.0.0: gateway 10.4.64.11. 2017.11.07 17:39:57 - OpenVPN > /sbin/route add -net 104.254.90.202 192.168.0.1 255.255.255.255. 2017.11.07 17:39:57 - OpenVPN > add net 104.254.90.202: gateway 192.168.0.1. 2017.11.07 17:39:57 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:39:57 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.11.07 17:39:57 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.11.07 17:39:57 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.11.07 17:39:57 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1). 2017.11.07 17:39:58 - DNS of a network adapter forced (ibVPN-L2TP 14, from Automatic to 10.4.0.1). 2017.11.07 17:39:58 - DNS of a network adapter forced (ibVPN-L2TP 15, from Automatic to 10.4.0.1). 2017.11.07 17:39:58 - DNS of a network adapter forced (ibVPN-L2TP 16, from Automatic to 10.4.0.1). 2017.11.07 17:39:58 - DNS of a network adapter forced (ibVPN-L2TP 17, from Automatic to 10.4.0.1). 2017.11.07 17:39:58 - Flushing DNSI 2017.11.07 17:39:59 - Checking route
  3. I'm having constant problems with the Eddie GUI on Ubuntu 17.04. When the VPN connection with the network lock is up and running, everything works fine. The issues start when the VPN (and the network lock) is disabled, the original non-VPN connection is not restored. My tests show that when disabling the VPN, the routing rules are empty and none of the original, non-VPN rules are restored. I've seen this behavior for about a year, now, and I believe it is a very annoying bug of the Eddie interface. By looking at the forum, it seems it is a problem shared across different systems (or at least it affects Windows, too). The only workaround I found so far is to reboot the system preventing the auto-start of the GUI. Any chances it can be fixed? Thanks, S
  4. Hi, id like to: vpn -> tor in a vm but, i cant connect to tor, its stucked at: Establishing a tor circuit or: connecting to tor maybe i should allow it in address allowed?
  5. I do understand that the Network Lock is there to prevent many kinds of leaks. Yet, I am not certain which settings are appropriate for my purposes, and I could not find any definitive answers. I'd like the Network Lock to do be active whenever I'm connected to an Air server, but never to be active when I'm not connected. (BTW, I'm using Windows.) So my question goes like this: When I connect to an Air server, will the Network Lock become active by default? Or do I have to enable it manually? Having a look at the display with the lock icon on the right above, it seems to me that the latter ist true. As I understand it, by going to "Preferences" and then choosing "Activate Network Lock at startup", I can make sure the Network Lock is enabled just as long as the Air Client is running - whether my OS is connected to an Air server or not. (If this is the case, I will be very fine with this solution.) Am I right so far? If I got it right, I would personally guess that many people might not intuitively apprehend how to work properly with the Network Lock. Hence I would humbly suggest to you to consider changing parameters, so that when people connect to a n Air server, the Network lock will be active for their whole session by default. Thank you for your help and support.
  6. Linux Mint 18.2 Mate Kernel 4.11.0-14 Eddie 2.13.4 After the update to 2.13.4 Eddie told me to disable ipv6. So I did. GRUB_CMDLINE_LINUX="ipv6.disable=1" now I can't activate network lock anymore.
  7. I enabled network lock at Eddie and thought that then every traffic is forced to be routed to AirVPN. If WebRTC Limiter is not activated, ipleak.net says that there is a WebRTC leak.(It shows my ipv6) How is it possible?
  8. Hello I'm new to AirVPN and VPN's in general so my apologies in advance for the myriad of dumb questions I will probably ask. I did try searching for my particular issue, but couldn't find anything I am running Eddie 2.12.4 on openSUSE 13.2, I activate Network Lock on startup. In preferences I disabled Allow lan/private and ping. IPv6 is set to disable in the Advanced Settings section. Everything starts out working great. I go to ipleak.net everything looks good (no ipv6) I go to test-ipv6.com everything ipv6 fails, then about 10-15 mins in if I go back to either of those sites it can now see my ipv6. What's going on here?
  9. I've been having this problem for months now. I'm running Windows 7 and Windows 10 and use Bitdefender Internet Security on both machines. I want to be able to access certain websites outside of the VPN tunnel (so they see my real IP), but still force all other traffic through the VPN tunnel. To achieve this, I added the exceptions inside Eddie under Settings -> Routes. The problem is: they only work as long as I don't have network lock enabled. How do I know this? I'm testing these routes with sites like ipleak.net, doileak.com, ifconfig.co etc. As soon as I activate network lock, I can't access the sites I specified under "routes" anymore. I can ping them just fine, and run a traceroute command, but I can't access them inside any web browser. I also tried adding them under "allowed addresses" inside the "network lock" settings without any luck. I've been trying to solve this issue with staff for almost two months now, but without luck so far. It would be awesome if some of you could try to reproduce the same error, i.e. setting up these routes to see if you can access these sites while network lock is active. "Disclaimer": I'm using the "Windows Filtering Platform" method for network lock. (Which is the default method anyway as far as I'm aware) Everything is working just fine when I'm using the "Windows Firewall" method, even with network lock enabled. However, I don't want to rely on the Windows Firewall, so I'm using the firewall from Bitdefender Internet Security instead Any ideas or suggestions? Can any of you reproduce this same issue? Are any of you using another third party firewall that doesn't cause this issue? If so, which one? PS: Here are the IPs for some of the sites I used for testing so you can just copy and paste them if you want to test it for yourselves: 95.85.16.212 (ipleak.net) 62.243.70.171 (doileak.com) 188.113.88.193 (ifconfig.co)
  10. Hey all, This is my second Day with AirVPN. I'm merely testing the water so I've signed up for 3 days. Initially I was drawn by the famous Network Lock, however right now it seems to be causing me trouble. Anyway, here's what I want to do. I would like to use tunnel only on certain sites. Therefore, I have been using the "Routes" option in the Eddie preference tab. From there, I've set the "Note Specified Routes go:" to Outside of Tunnel. All the sites that I want to be accessing through the tunnel are added to the list with the Action "Inside the VPN Tunnel". Everything works as expected and I've been testing with Ipleak.net to make sure. From there, I noticed the little message that says "Ip in 'Outside of Tunnel' are also unlocked When Netowrk Lock is active'", which according to my understanding means that even with NL active, if a certain ip is set to be Outside the Tunnel, it will remain accesible. Correct me if I'm wrong. Therefore, with my current setup, every single site should still be accessible with NL on, and only the sites that are specifically listed to "Inside Tunnel" should lose their connection upon VPN failure. Correct? However, it seems that when I turn on NL. I lose Access to every single site, whether they be Inside or Outside the Tunnel. Is this a bug, or I'm I just massively misunderstanding this. I could go with regular windows Iptables, but I'd rather use Eddie as it's much more user friendly. Thanks in Advance!
  11. Hi, Joined up last week and was running things with TunnelBlick for a bit with no problems. Then got a bit curious about the extra functionality I might get from the in-house client Eddie. Which in turn led to thinking that the network lock for me would be a good plan since the VPN is for a computer/file server that will be unattended most of the time so it would be nice to have a failsafe. With it on a number of apps stopped being able to sync of connect. First Google couldn't sign me in, then MEGAsync stopped connecting. After that the Dropbox Client stopped syncing all the while the internet worked fine. Finally my PLEX server crashed and refused to open again. I turned off Network lock and restarted Eddie, but that didn't make things better. I restarted the mac, I have deleted the location profile and made a fresh connection to my router, I spotted that Network lock works along the lines of the Mac Firewall so I turned mine on thinking this might over-ride whatever was going on and individually added all the programs that couldn't connect to the Firewall 'allowed' list. This has only fixed Dropbox..... Can I assume that Eddie has left behind some script somewhere that I need to delete?? Eoin (MacBook Air OSX 10.12)
  12. Hello, I have a problem with network lock : - When i don't use the network lock using eddie : I get using the same vpn server around 35 ms ping to 8.8.8.8My download speed is normal - But when I activate it the ping drop and it shows 338 msMy download speed is around 10-30 kb/s lower I have Windows 10 Pro and Kaspersky Internet Security 2017 I 2017.06.19 01:01:03 - Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.15063.0, Mono/.Net Framework: v4.0.30319 . 2017.06.19 01:01:03 - Reading options from C:\Users\Phoenix\AppData\Local\AirVPN\AirVPN.xml . 2017.06.19 01:01:03 - Profile options not found, using defaults. . 2017.06.19 01:01:04 - Data path: C:\Users\Phoenix\AppData\Local\AirVPN . 2017.06.19 01:01:04 - Application path: C:\Program Files\AirVPN . 2017.06.19 01:01:04 - Executable path: C:\Program Files\AirVPN\AirVPN.exe . 2017.06.19 01:01:04 - Command line arguments (1): path="home" . 2017.06.19 01:01:04 - Operating System: Microsoft Windows NT 10.0.15063.0 . 2017.06.19 01:01:04 - Cannot find tunnel adapter. E 2017.06.19 01:01:05 - OpenVPN Driver - Not available - Will be installed at next connection. I 2017.06.19 01:01:05 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe) I 2017.06.19 01:01:05 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2017.06.19 01:01:05 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2017.06.19 01:01:05 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe) I 2017.06.19 01:01:05 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2017.06.19 01:01:06 - Ready . 2017.06.19 01:01:06 - Updating systems & servers data ... . 2017.06.19 01:01:07 - Systems & servers data update completed I 2017.06.19 01:01:47 - Checking login ... ! 2017.06.19 01:01:47 - Logged in. ! 2017.06.19 01:02:03 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 01:02:38 - Session starting. . 2017.06.19 01:02:38 - Cannot find tunnel adapter. ! 2017.06.19 01:02:38 - Installing tunnel driver . 2017.06.19 01:02:47 - IPv6 disabled with packet filtering. I 2017.06.19 01:02:47 - Checking authorization ... ! 2017.06.19 01:02:47 - Connecting to Alcor (Ukraine, Kiev) . 2017.06.19 01:02:48 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:02:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:02:48 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:02:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:02:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:02:48 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:02:48 - OpenVPN > UDP link remote: [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:48 - OpenVPN > TLS: Initial packet from [AF_INET]91.231.84.39:443, sid=f5dffacd b875ad5e . 2017.06.19 01:02:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:02:48 - OpenVPN > Validating certificate key usage . 2017.06.19 01:02:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:02:48 - OpenVPN > VERIFY KU OK . 2017.06.19 01:02:48 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:02:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:02:48 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:02:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:02:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:02:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:02:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.145 255.255.0.0' . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:02:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:02:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:02:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:49 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:02:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:02:49 - OpenVPN > open_tun . 2017.06.19 01:02:49 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:02:49 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:02:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.145/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:02:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.145/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:02:49 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:02:49 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:02:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 91.231.84.39 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - Starting Management Interface . 2017.06.19 01:02:54 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:02:54 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:02:54 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:02:54 - Flushing DNS I 2017.06.19 01:02:58 - Checking route I 2017.06.19 01:02:59 - Checking DNS ! 2017.06.19 01:03:10 - Connected. . 2017.06.19 01:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:03:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:11:09 - Updating systems & servers data ... . 2017.06.19 01:11:10 - Systems & servers data update completed . 2017.06.19 01:21:13 - Updating systems & servers data ... . 2017.06.19 01:21:14 - Systems & servers data update completed ! 2017.06.19 01:24:32 - Disconnecting . 2017.06.19 01:24:32 - Management - Send 'signal SIGTERM' . 2017.06.19 01:24:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:24:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 91.231.84.39 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:24:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:24:37 - Connection terminated. . 2017.06.19 01:24:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:24:37 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:24:37 - Checking authorization ... ! 2017.06.19 01:24:38 - Connecting to Gomeisa (Sweden, Uppsala) . 2017.06.19 01:24:38 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:24:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:24:38 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:24:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:24:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:24:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:24:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:24:38 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:24:38 - OpenVPN > UDP link remote: [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:38 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=709b80a1 527c7531 . 2017.06.19 01:24:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:24:38 - OpenVPN > Validating certificate key usage . 2017.06.19 01:24:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:24:38 - OpenVPN > VERIFY KU OK . 2017.06.19 01:24:38 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:24:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:24:38 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:24:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gomeisa, emailAddress=info@airvpn.org . 2017.06.19 01:24:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:24:38 - OpenVPN > [Gomeisa] Peer Connection Initiated with [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:39 - OpenVPN > SENT CONTROL [Gomeisa]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:24:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.21 255.255.0.0,peer-id 11,cipher AES-256-GCM' . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 01:24:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:24:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:24:39 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:24:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:24:39 - OpenVPN > open_tun . 2017.06.19 01:24:40 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:24:40 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:24:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.21/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:24:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.21/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:24:40 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:24:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:24:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - Starting Management Interface . 2017.06.19 01:24:44 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:24:44 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:24:44 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:24:44 - Flushing DNS I 2017.06.19 01:24:47 - Checking route I 2017.06.19 01:24:50 - Checking DNS ! 2017.06.19 01:25:02 - Connected. . 2017.06.19 01:25:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:25:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:26:11 - OpenVPN > write UDP: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2017.06.19 01:27:00 - Above log line repeated 26 times more ! 2017.06.19 01:27:00 - Disconnecting . 2017.06.19 01:27:00 - Management - Send 'signal SIGTERM' . 2017.06.19 01:27:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:27:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.1.1 W 2017.06.19 01:27:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:27:05 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:27:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:27:05 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:27:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:27:05 - Connection terminated. . 2017.06.19 01:27:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:27:05 - DNS leak protection with packet filtering disabled. . 2017.06.19 01:27:05 - IPv6 restored with packet filtering. . 2017.06.19 01:27:05 - Flushing DNS ! 2017.06.19 01:27:08 - Session terminated. I 2017.06.19 01:27:09 - Session starting. . 2017.06.19 01:27:09 - IPv6 disabled with packet filtering. I 2017.06.19 01:27:24 - Checking authorization ... ! 2017.06.19 01:27:24 - Connecting to Alchiba (Netherlands, Alblasserdam) . 2017.06.19 01:27:27 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:27:27 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:27:27 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:27:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:27:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:27:27 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:27:27 - OpenVPN > UDP link remote: [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=9ef08779 1093a45a . 2017.06.19 01:27:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:27:27 - OpenVPN > Validating certificate key usage . 2017.06.19 01:27:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:27:27 - OpenVPN > VERIFY KU OK . 2017.06.19 01:27:27 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:27:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:27:27 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:27:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:27:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:27:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:27:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.113.161 255.255.0.0' . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:27:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:27:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:27:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:27:27 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:27:27 - OpenVPN > open_tun . 2017.06.19 01:27:27 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:27:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:27:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.113.161/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:27:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.113.161/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:27:27 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:27:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:27:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.180 MASK 255.255.255.255 192.168.43.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - Starting Management Interface . 2017.06.19 01:27:31 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:27:31 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:27:31 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:27:31 - Flushing DNS I 2017.06.19 01:27:35 - Checking route I 2017.06.19 01:27:35 - Checking DNS ! 2017.06.19 01:27:48 - Connected. . 2017.06.19 01:27:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:27:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2017.06.19 01:29:04 - Disconnecting . 2017.06.19 01:29:04 - Management - Send 'signal SIGTERM' . 2017.06.19 01:29:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:29:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.180 MASK 255.255.255.255 192.168.43.1 W 2017.06.19 01:29:09 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.43.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:29:09 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:29:09 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:29:09 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:29:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:29:09 - Connection terminated. . 2017.06.19 01:29:09 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:29:09 - DNS leak protection with packet filtering disabled. . 2017.06.19 01:29:09 - IPv6 restored with packet filtering. . 2017.06.19 01:29:09 - Flushing DNS ! 2017.06.19 01:29:12 - Session terminated. ! 2017.06.19 01:29:16 - Deactivation of Network Lock ! 2017.06.19 01:30:06 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 01:30:08 - Session starting. . 2017.06.19 01:30:08 - IPv6 disabled with packet filtering. I 2017.06.19 01:30:08 - Checking authorization ... ! 2017.06.19 01:30:08 - Connecting to Muscida (Netherlands, Alblasserdam) . 2017.06.19 01:30:11 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:30:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:30:11 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:30:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:30:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:30:11 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:30:11 - OpenVPN > UDP link remote: [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.153:443, sid=ac0b5f83 28fed3da . 2017.06.19 01:30:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:30:11 - OpenVPN > Validating certificate key usage . 2017.06.19 01:30:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:30:11 - OpenVPN > VERIFY KU OK . 2017.06.19 01:30:11 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:30:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:30:11 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:30:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:30:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:30:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.112.39 255.255.0.0' . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:30:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:30:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:30:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:30:11 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:30:11 - OpenVPN > open_tun . 2017.06.19 01:30:11 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:30:11 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:30:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.112.39/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:30:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.112.39/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:30:11 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:30:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:30:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.153 MASK 255.255.255.255 192.168.43.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - Starting Management Interface . 2017.06.19 01:30:15 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:30:15 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:30:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:30:15 - Flushing DNS I 2017.06.19 01:30:18 - Checking route I 2017.06.19 01:30:19 - Checking DNS ! 2017.06.19 01:30:31 - Connected. . 2017.06.19 01:30:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:30:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:30:38 - OpenVPN > write UDP: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2017.06.19 01:31:17 - Updating systems & servers data ... . 2017.06.19 01:31:31 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.06.19 01:31:31 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.06.19 01:31:31 - OpenVPN > Restart pause, 5 second(s) ! 2017.06.19 01:31:31 - Disconnecting . 2017.06.19 01:31:31 - Management - Send 'signal SIGTERM' . 2017.06.19 01:31:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.153 MASK 255.255.255.255 192.168.43.1 W 2017.06.19 01:31:31 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.43.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:31:31 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:31:31 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:31:31 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:31:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2017.06.19 01:31:31 - Connection terminated. . 2017.06.19 01:31:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:31:31 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:31:34 - Checking authorization ... ! 2017.06.19 01:31:34 - Connecting to Salm (Netherlands, Alblasserdam) . 2017.06.19 01:31:34 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:31:34 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:31:34 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:31:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:31:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:31:34 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:31:34 - OpenVPN > UDP link remote: [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.19:443, sid=da8f8bd9 1d0fc6fd . 2017.06.19 01:31:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:31:34 - OpenVPN > Validating certificate key usage . 2017.06.19 01:31:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:31:34 - OpenVPN > VERIFY KU OK . 2017.06.19 01:31:34 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:31:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:31:34 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:31:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:31:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:31:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.112.242 255.255.0.0' . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:31:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:31:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:31:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:36 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:31:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:31:36 - OpenVPN > open_tun . 2017.06.19 01:31:36 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:31:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:31:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.112.242/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:31:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.112.242/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:31:36 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:31:36 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:31:37 - Systems & servers data update completed . 2017.06.19 01:31:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.19 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - Starting Management Interface . 2017.06.19 01:31:41 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:31:41 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:31:41 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:31:41 - Flushing DNS I 2017.06.19 01:31:44 - Checking route I 2017.06.19 01:31:47 - Checking DNS ! 2017.06.19 01:32:01 - Connected. . 2017.06.19 01:32:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:32:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:41:39 - Updating systems & servers data ... . 2017.06.19 01:41:42 - Systems & servers data update completed . 2017.06.19 01:51:45 - Updating systems & servers data ... . 2017.06.19 01:51:47 - Systems & servers data update completed ! 2017.06.19 01:54:13 - Disconnecting . 2017.06.19 01:54:13 - Management - Send 'signal SIGTERM' . 2017.06.19 01:54:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:54:13 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.19 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:54:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:54:18 - Connection terminated. . 2017.06.19 01:54:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:54:18 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:54:18 - Checking authorization ... ! 2017.06.19 01:54:18 - Connecting to Cervantes (Germany, Frankfurt) . 2017.06.19 01:54:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:54:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:54:18 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:54:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:54:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:54:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:54:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:54:18 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:54:18 - OpenVPN > UDP link remote: [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:18 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.26:443, sid=bb525f22 c266d0f5 . 2017.06.19 01:54:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:54:18 - OpenVPN > Validating certificate key usage . 2017.06.19 01:54:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:54:18 - OpenVPN > VERIFY KU OK . 2017.06.19 01:54:18 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:54:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:54:18 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:54:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cervantes, emailAddress=info@airvpn.org . 2017.06.19 01:54:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:54:19 - OpenVPN > [Cervantes] Peer Connection Initiated with [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:20 - OpenVPN > SENT CONTROL [Cervantes]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:54:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.177 255.255.0.0,peer-id 3,cipher AES-256-GCM' . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 01:54:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:54:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:54:20 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:54:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:54:20 - OpenVPN > open_tun . 2017.06.19 01:54:20 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:54:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:54:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.177/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:54:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.177/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:54:20 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:54:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:54:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 185.189.112.26 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - Starting Management Interface . 2017.06.19 01:54:25 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:54:25 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:54:25 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:54:25 - Flushing DNS I 2017.06.19 01:54:28 - Checking route I 2017.06.19 01:54:28 - Checking DNS ! 2017.06.19 01:54:41 - Connected. . 2017.06.19 01:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:54:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 02:01:50 - Updating systems & servers data ... . 2017.06.19 02:01:52 - Systems & servers data update completed ! 2017.06.19 02:04:40 - Disconnecting . 2017.06.19 02:04:40 - Management - Send 'signal SIGTERM' . 2017.06.19 02:04:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 02:04:40 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.189.112.26 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 02:04:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 02:04:45 - Connection terminated. . 2017.06.19 02:04:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 02:04:45 - DNS leak protection with packet filtering disabled. . 2017.06.19 02:04:45 - IPv6 restored with packet filtering. . 2017.06.19 02:04:45 - Flushing DNS ! 2017.06.19 02:04:48 - Session terminated. ! 2017.06.19 02:04:48 - Deactivation of Network Lock I 2017.06.19 02:04:50 - Session starting. . 2017.06.19 02:04:50 - IPv6 disabled with packet filtering. I 2017.06.19 02:04:50 - Checking authorization ... ! 2017.06.19 02:04:50 - Connecting to Capricornus (Belgium, Brussels) . 2017.06.19 02:04:50 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:04:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:04:50 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:04:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:04:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:04:50 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:04:50 - OpenVPN > UDP link remote: [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:50 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=8ab7c700 158c263d . 2017.06.19 02:04:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:04:50 - OpenVPN > Validating certificate key usage . 2017.06.19 02:04:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:04:50 - OpenVPN > VERIFY KU OK . 2017.06.19 02:04:50 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:04:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:04:50 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:04:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org . 2017.06.19 02:04:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:04:51 - OpenVPN > [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:52 - OpenVPN > SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:04:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.185 255.255.0.0' . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:04:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:04:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:04:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:52 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:04:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:04:52 - OpenVPN > open_tun . 2017.06.19 02:04:52 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:04:52 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:04:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.185/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:04:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.185/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:04:52 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:04:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 02:04:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - Starting Management Interface . 2017.06.19 02:04:57 - OpenVPN > Initialization Sequence Completed . 2017.06.19 02:04:57 - DNS leak protection with packet filtering enabled. . 2017.06.19 02:04:57 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 02:04:57 - Flushing DNS I 2017.06.19 02:05:00 - Checking route I 2017.06.19 02:05:00 - Checking DNS ! 2017.06.19 02:05:13 - Connected. . 2017.06.19 02:05:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 02:05:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.06.19 02:11:54 - Disconnecting . 2017.06.19 02:11:54 - Management - Send 'signal SIGTERM' . 2017.06.19 02:11:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 02:11:54 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 02:11:55 - Updating systems & servers data ... . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 02:11:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 02:11:59 - Connection terminated. . 2017.06.19 02:11:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 02:11:59 - DNS leak protection with packet filtering disabled. . 2017.06.19 02:11:59 - IPv6 restored with packet filtering. . 2017.06.19 02:11:59 - Flushing DNS ! 2017.06.19 02:12:02 - Session terminated. . 2017.06.19 02:12:06 - Systems & servers data update completed ! 2017.06.19 02:12:07 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 02:12:08 - Session starting. . 2017.06.19 02:12:08 - IPv6 disabled with packet filtering. I 2017.06.19 02:12:08 - Checking authorization ... ! 2017.06.19 02:12:08 - Connecting to Errai (Germany, Frankfurt) . 2017.06.19 02:12:09 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:12:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:12:09 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:12:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:12:09 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:12:09 - OpenVPN > UDP link remote: [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:09 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.10:443, sid=dc088575 49b8b3cc . 2017.06.19 02:12:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:12:09 - OpenVPN > Validating certificate key usage . 2017.06.19 02:12:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:12:09 - OpenVPN > VERIFY KU OK . 2017.06.19 02:12:09 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:12:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:12:09 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:12:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2017.06.19 02:12:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:12:09 - OpenVPN > [Errai] Peer Connection Initiated with [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:10 - OpenVPN > SENT CONTROL [Errai]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:12:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.196 255.255.0.0,peer-id 9,cipher AES-256-GCM' . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 02:12:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 02:12:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 02:12:10 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:12:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:12:10 - OpenVPN > open_tun . 2017.06.19 02:12:10 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:12:10 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:12:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.196/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:12:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.196/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:12:10 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:12:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 ! 2017.06.19 02:12:11 - Disconnecting . 2017.06.19 02:12:11 - Connection terminated. I 2017.06.19 02:12:11 - Cancel requested. . 2017.06.19 02:12:11 - IPv6 restored with packet filtering. . 2017.06.19 02:12:11 - Flushing DNS ! 2017.06.19 02:12:15 - Session terminated. I 2017.06.19 02:12:18 - Session starting. . 2017.06.19 02:12:18 - IPv6 disabled with packet filtering. I 2017.06.19 02:12:18 - Checking authorization ... ! 2017.06.19 02:12:18 - Connecting to Capricornus (Belgium, Brussels) . 2017.06.19 02:12:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:12:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:12:18 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:12:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:12:18 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:12:18 - OpenVPN > UDP link remote: [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:18 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=bfbedb9f 3db46e37 . 2017.06.19 02:12:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:12:18 - OpenVPN > Validating certificate key usage . 2017.06.19 02:12:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:12:18 - OpenVPN > VERIFY KU OK . 2017.06.19 02:12:18 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:12:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:12:18 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:12:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org . 2017.06.19 02:12:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:12:18 - OpenVPN > [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:19 - OpenVPN > SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:12:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.185 255.255.0.0' . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:12:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:12:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:12:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:19 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:12:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:12:19 - OpenVPN > open_tun . 2017.06.19 02:12:20 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:12:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:12:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.185/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:12:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.185/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:12:20 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:12:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 02:12:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - Starting Management Interface . 2017.06.19 02:12:24 - OpenVPN > Initialization Sequence Completed . 2017.06.19 02:12:24 - DNS leak protection with packet filtering enabled. . 2017.06.19 02:12:24 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 02:12:24 - Flushing DNS I 2017.06.19 02:12:28 - Checking route I 2017.06.19 02:12:28 - Checking DNS ! 2017.06.19 02:12:42 - Connected. . 2017.06.19 02:12:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Thank you for your help
  13. Accessing an SMB share over TCP port 445. Kaspersky Internet Security 2016 on Win7 x64. "Addresses allowed" not fully working with Network lock enabled. Last address in list works. Disabled wfw - no change Disabled KIS - no change EDIT: Something happened to this posts' tags. Some ended up bunched together?
  14. Hi. I configured Eddie so that the IPs of certain websites are accessed only from outside the VPN tunnel. (Settings -> Routes) These routing rules work just fine, but as soon as I activate network lock I can't access the specified sites anymore. I can ping them, but I can't access them inside the browser. They basically get blocked. I tried multiple versions of Eddie (2.12.4, 2.11.15, 2.10.39, various protocols and ports and of course various websites. I also tried both methods for network lock (Windows Firewall & Windows Filtering Platform). I'm having this issue on both Windows 7 and Windows 10. Any ideas how to fix this? Anyone else having this problem? Please, if you have any idea at all on how to fix this, let me know. I really need both network lock and routing rules to work simultaneously.
  15. Hey there When having a torrent client activated over night, Windows 10 decided to restart itself on it's own. It couldn't fully restart because of the Client preventing it, and that's a good thing. But is the Network Lock still active in that state? And if not, does the torrent client run anyway? It sounds a bit weird but hopefully you guys understand what I mean. Huge thanks for answers in advance
  16. I have been using Air/Eddie for about 1.5 years, never had an issue like this. I was looking for a torrent, so I turned on my PC, activated network lock and connected to recommended server, all just like normal. I couldn't find what I was looking for, so I was just going to watch a show on Netflix. So I disconnected, and turned off the network lock, and then closed Eddie. Once disconnected, I realized, that now, without the VPN connected, my internet didn't work (as if the network lock was still on), so I reopened, Eddie to confirm it was not activated, and it is not. I restarted the PC, no change, still no internet access, Re-open Eddie, and cycle network lock on and off, no change, connect to Recommended server, and everything is working fine, disconnect, no network lock, still no internet. I have confirmed my IPv4 is set to Auto (which I saw as a suggestion to a similar sounding issue). Eddie version is 2.10.3 Thanks for any help you can offer.
  17. Hey, everyone: Not sure if this is the best place to post this or not, or if this is being discussed elsewhere; I tried to search for topics related to this, but couldn't find anything, so I figured I'd start my own. If it needs to be moved or is already being discussed, please change it, or let me know where I can find the information. I'm not really a fan of Windows 10 firewall, and was hoping there is now a way to use Network lock with Kaspersky firewall? I know a year or so ago, there wasn't really a way, but now I'm seeing something about "Windows Filtering Platform" to help with that? What is WFP? Is there a way to get Eddie and the Network Lock to work with Kaspersky? If so, how would I go about setting it up, and testing to make sure it's setup correctly? If not, how can I make sure that my Network Lock and Kaspersky aren't interfering with one another and are setup correctly? Thank you, Kevin
  18. Hey there, I can't seem to establish a connection to my local devices (e. g. router, NAS, etc.) with engaged network lock, even though "allow private/local traffic" is enabled in the preferences. I'm using latest stable version of Eddie on Win 10. Network lock is the only reliable way to prevent DNS leak (as tested on your IP/DNS leak test site), so it is not an option to just not engage it. I tried to route traffic to local IP's via rules, but to no avail. What am I missing? Cheers!
  19. The new default Network Lock breaks Plex media server connection to the web. The ports do not successfully forward. I have to revert back to Windows firewall mode for the ports to successfully forward. Is there a way that I can get Plex to work with the new Network lock or should I using firewall mode instead?
  20. HI I recently upgraded to Eddie 2.11.15 and have noticed that after disconnecting from the VPN , the network lock feature does not work correctly . Although the network lock blocks access to the internet it fails to prevent DNS requests leaving the local adapter (i.e 192.168.1.*) The old Eddie client's network lock prevented this by maintaining the Airvpn DNS config on the local adapter. I realize that one of the "features of the new client is that it no longer uses windows firewall, don't know if this is the reason for the DNS problem but looks as though I will have to use some kind of script in the "session end" external shell to correct the DNS issue . Unless I have missed something. I am using DNSEye to monitor the DNS requests I am seeing after the vpn session ends.
  21. Hi all, I have a little problem. I try to tell it with my terrible English. So i like to setup this VPN(airvpn client) >>> SOCKS PROXY>>> Browsers and others, virtual machines etc... (all socks traffic over vpn). The host os is linux.
  22. I would like to suggest an additional Eddie configuration option where someone could set an option similar to the existing "Activate Network Lock at startup", but that triggers on the user connecting/disconnecting. For example, with this option set (let's call it "Sync Network Lock with VPN Connection"): Launch or Restore (previously minimized) Eddie and log in Click the Connect to a recommended server button Network Lock is auto-activated VPN connection is established I do what I need on the VPN Close my VPN connection Network Lock is Auto-deactivated Minimize/Close EddieIf I was a user of the "Connect at startup" option, then I would appreciate and use the "Activate Network Lock at startup" options as they compliment each other. Since I like to launch and keep Eddie open all the time (usually minimized to the systems tray) until I want to establish a VPN connection, it would suit my usage style better if this new option was added, and remove my need to remember to enable/disable NL. Hopefully others would find this useful as well.
  23. Hello, I've recently installed OpenVPN for Android (the open-source recommended choice) but I'm concerned about different issues. For instance, this app doesn't autostart at boot / reboot but has to be manually started. BTW Android uses wifi's previous state after reboot : when Wifi was "on" our real IP is visible until OpenVPN is manually started. When it crashes (it happens with the latest version) our real IP gets exposed too. I wonder if it could be possible to configure a firewall (AfWall+ or Droidwall) to block all the traffic excepting the one which transits through OpenVPN for both Wifi and data (3G/4G) ? These two apps are using iptables but I don't know how to write the custom rules matching my requirements. The help and knowledge of some computer savvy members would be appreciated. If it works we could maybe create a tutorial for the "How to" section of this forum ? I've collected several articles regarding Android and iptables but I've no idea how I could adapt all this for AirVPN .ovpn default config file (Europe). https://android.stackexchange.com/questions/14455/how-can-i-block-the-traffic-outside-the-vpn-even-if-the-vpn-is-down https://github.com/ukanth/afwall/wiki/Apps-leak-private-user-data-during-boot https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy https://droidvpn.com/page/stopping-leaks-with-droidwall-when-using-droidvpn-8/ https://airvpn.org/faq/software_lock/ Any idea ? Thanks
  24. Hello, I have a question that maybe someone more knowledgeable can answer. I have a computer at home that runs airvpn client and a remote computer. I want to be able to connect from either computer to another one with ssh. Without airvpn client, everything works (obviously). If I run airvpn without network lock, I can ssh from home to remote (it goes via the AirVPN server) but not from remote to home. I tried to start airvpn with the parameter "routes.custom=my.remote.ip.addr,255.255.255.255,out" but it didn't help - the required route was not added to the routing table. However, that problem was easily solved: I added the route separately with "route add -host my.remote.ip.address gw 192.168.1.1" and all was well: ssh works from home to remote and from remote to home bypassing AirVPN as I want it to do. Now, I enable network lock. This time I need to add "allowed IP" parameter to be able to ssh from home to remote: ./airvpn -cli -connect -netlock -login=**** password=**** netlock.allowed_ips=my.remote.ip.addr But ssh from remote to home is blocked by the firewall. I can't find any airvpn parameter that can be used to create custom firewall rules. So I ended up with adding the required rule myself. Before: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 177 16717 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 93 8963 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 26 4651 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1890 460K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 6 502 DROP all -- any any anywhere anywhere Add the rule: iptables -t filter -I INPUT 9 -i eth0 -p tcp -s my.remote.ip.addr --dport 22 -j ACCEPT After: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 182 17197 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 107 10296 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 41 6945 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1981 480K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 0 0 ACCEPT tcp -- eth0 any my.remote.ip.addr anywhere tcp dpt:22 10 6 502 DROP all -- any any anywhere anywhere Now everything works again, but the question remains: what is the best way to achieve that ? In the worst case scenario, I can just start airvpn in the background, wait a minute or so and then run iptables with my additional rule. But that looks ugly. Can anyone think of a better way ? Maybe some "event.session..." or "event.vpn..." parameter will do the trick ? Thanks for any help.
×
×
  • Create New...