Jump to content
Not connected, Your IP: 3.226.248.180

Search the Community

Showing results for tags 'network lock'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 84 results

  1. Linux Mint 18.2 Mate Kernel 4.11.0-14 Eddie 2.13.4 After the update to 2.13.4 Eddie told me to disable ipv6. So I did. GRUB_CMDLINE_LINUX="ipv6.disable=1" now I can't activate network lock anymore.
  2. I enabled network lock at Eddie and thought that then every traffic is forced to be routed to AirVPN. If WebRTC Limiter is not activated, ipleak.net says that there is a WebRTC leak.(It shows my ipv6) How is it possible?
  3. I've been having this problem for months now. I'm running Windows 7 and Windows 10 and use Bitdefender Internet Security on both machines. I want to be able to access certain websites outside of the VPN tunnel (so they see my real IP), but still force all other traffic through the VPN tunnel. To achieve this, I added the exceptions inside Eddie under Settings -> Routes. The problem is: they only work as long as I don't have network lock enabled. How do I know this? I'm testing these routes with sites like ipleak.net, doileak.com, ifconfig.co etc. As soon as I activate network lock, I can't access the sites I specified under "routes" anymore. I can ping them just fine, and run a traceroute command, but I can't access them inside any web browser. I also tried adding them under "allowed addresses" inside the "network lock" settings without any luck. I've been trying to solve this issue with staff for almost two months now, but without luck so far. It would be awesome if some of you could try to reproduce the same error, i.e. setting up these routes to see if you can access these sites while network lock is active. "Disclaimer": I'm using the "Windows Filtering Platform" method for network lock. (Which is the default method anyway as far as I'm aware) Everything is working just fine when I'm using the "Windows Firewall" method, even with network lock enabled. However, I don't want to rely on the Windows Firewall, so I'm using the firewall from Bitdefender Internet Security instead Any ideas or suggestions? Can any of you reproduce this same issue? Are any of you using another third party firewall that doesn't cause this issue? If so, which one? PS: Here are the IPs for some of the sites I used for testing so you can just copy and paste them if you want to test it for yourselves: 95.85.16.212 (ipleak.net) 62.243.70.171 (doileak.com) 188.113.88.193 (ifconfig.co)
  4. Hello I'm new to AirVPN and VPN's in general so my apologies in advance for the myriad of dumb questions I will probably ask. I did try searching for my particular issue, but couldn't find anything I am running Eddie 2.12.4 on openSUSE 13.2, I activate Network Lock on startup. In preferences I disabled Allow lan/private and ping. IPv6 is set to disable in the Advanced Settings section. Everything starts out working great. I go to ipleak.net everything looks good (no ipv6) I go to test-ipv6.com everything ipv6 fails, then about 10-15 mins in if I go back to either of those sites it can now see my ipv6. What's going on here?
  5. Hey all, This is my second Day with AirVPN. I'm merely testing the water so I've signed up for 3 days. Initially I was drawn by the famous Network Lock, however right now it seems to be causing me trouble. Anyway, here's what I want to do. I would like to use tunnel only on certain sites. Therefore, I have been using the "Routes" option in the Eddie preference tab. From there, I've set the "Note Specified Routes go:" to Outside of Tunnel. All the sites that I want to be accessing through the tunnel are added to the list with the Action "Inside the VPN Tunnel". Everything works as expected and I've been testing with Ipleak.net to make sure. From there, I noticed the little message that says "Ip in 'Outside of Tunnel' are also unlocked When Netowrk Lock is active'", which according to my understanding means that even with NL active, if a certain ip is set to be Outside the Tunnel, it will remain accesible. Correct me if I'm wrong. Therefore, with my current setup, every single site should still be accessible with NL on, and only the sites that are specifically listed to "Inside Tunnel" should lose their connection upon VPN failure. Correct? However, it seems that when I turn on NL. I lose Access to every single site, whether they be Inside or Outside the Tunnel. Is this a bug, or I'm I just massively misunderstanding this. I could go with regular windows Iptables, but I'd rather use Eddie as it's much more user friendly. Thanks in Advance!
  6. Hi, Joined up last week and was running things with TunnelBlick for a bit with no problems. Then got a bit curious about the extra functionality I might get from the in-house client Eddie. Which in turn led to thinking that the network lock for me would be a good plan since the VPN is for a computer/file server that will be unattended most of the time so it would be nice to have a failsafe. With it on a number of apps stopped being able to sync of connect. First Google couldn't sign me in, then MEGAsync stopped connecting. After that the Dropbox Client stopped syncing all the while the internet worked fine. Finally my PLEX server crashed and refused to open again. I turned off Network lock and restarted Eddie, but that didn't make things better. I restarted the mac, I have deleted the location profile and made a fresh connection to my router, I spotted that Network lock works along the lines of the Mac Firewall so I turned mine on thinking this might over-ride whatever was going on and individually added all the programs that couldn't connect to the Firewall 'allowed' list. This has only fixed Dropbox..... Can I assume that Eddie has left behind some script somewhere that I need to delete?? Eoin (MacBook Air OSX 10.12)
  7. I'm running AirVPN v.2.10.3 on a Windows 7 laptop with NOD32 antivirus (just downgraded from NOD32 internet security so that I can install the Comodo Firewall). I am messing around with these settings because the old uTorrent (v. 1.8.2; there is a reason for this) stopped downloading for some reason, and I couldn't figure it out in the NOD32 firewall settings. I am writing this post because I am confused about how the AirVPN "Network Lock" feature works with the Windows Firewall (especially since I will be using the Comodo setup here). Is there a conflict of some sort or problem with using Comodo Firewall along with the "Network Lock" feature? Or do they not work together? Also, if there are specific instructions on how to get uTorrent working on AirVPN (still doesn't work), I'm still at a loss. Thanks. JP
  8. Hello, I have a problem with network lock : - When i don't use the network lock using eddie : I get using the same vpn server around 35 ms ping to 8.8.8.8My download speed is normal - But when I activate it the ping drop and it shows 338 msMy download speed is around 10-30 kb/s lower I have Windows 10 Pro and Kaspersky Internet Security 2017 I 2017.06.19 01:01:03 - Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.15063.0, Mono/.Net Framework: v4.0.30319 . 2017.06.19 01:01:03 - Reading options from C:\Users\Phoenix\AppData\Local\AirVPN\AirVPN.xml . 2017.06.19 01:01:03 - Profile options not found, using defaults. . 2017.06.19 01:01:04 - Data path: C:\Users\Phoenix\AppData\Local\AirVPN . 2017.06.19 01:01:04 - Application path: C:\Program Files\AirVPN . 2017.06.19 01:01:04 - Executable path: C:\Program Files\AirVPN\AirVPN.exe . 2017.06.19 01:01:04 - Command line arguments (1): path="home" . 2017.06.19 01:01:04 - Operating System: Microsoft Windows NT 10.0.15063.0 . 2017.06.19 01:01:04 - Cannot find tunnel adapter. E 2017.06.19 01:01:05 - OpenVPN Driver - Not available - Will be installed at next connection. I 2017.06.19 01:01:05 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe) I 2017.06.19 01:01:05 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2017.06.19 01:01:05 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2017.06.19 01:01:05 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe) I 2017.06.19 01:01:05 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2017.06.19 01:01:06 - Ready . 2017.06.19 01:01:06 - Updating systems & servers data ... . 2017.06.19 01:01:07 - Systems & servers data update completed I 2017.06.19 01:01:47 - Checking login ... ! 2017.06.19 01:01:47 - Logged in. ! 2017.06.19 01:02:03 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 01:02:38 - Session starting. . 2017.06.19 01:02:38 - Cannot find tunnel adapter. ! 2017.06.19 01:02:38 - Installing tunnel driver . 2017.06.19 01:02:47 - IPv6 disabled with packet filtering. I 2017.06.19 01:02:47 - Checking authorization ... ! 2017.06.19 01:02:47 - Connecting to Alcor (Ukraine, Kiev) . 2017.06.19 01:02:48 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:02:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:02:48 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:02:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:02:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:02:48 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:02:48 - OpenVPN > UDP link remote: [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:48 - OpenVPN > TLS: Initial packet from [AF_INET]91.231.84.39:443, sid=f5dffacd b875ad5e . 2017.06.19 01:02:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:02:48 - OpenVPN > Validating certificate key usage . 2017.06.19 01:02:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:02:48 - OpenVPN > VERIFY KU OK . 2017.06.19 01:02:48 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:02:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:02:48 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:02:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:02:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:02:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]91.231.84.39:443 . 2017.06.19 01:02:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:02:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.145 255.255.0.0' . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:02:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:02:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:02:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:02:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:02:49 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:02:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:02:49 - OpenVPN > open_tun . 2017.06.19 01:02:49 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:02:49 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:02:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.145/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:02:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.145/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:02:49 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:02:49 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:02:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 91.231.84.39 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:02:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:02:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:02:54 - Starting Management Interface . 2017.06.19 01:02:54 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:02:54 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:02:54 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:02:54 - Flushing DNS I 2017.06.19 01:02:58 - Checking route I 2017.06.19 01:02:59 - Checking DNS ! 2017.06.19 01:03:10 - Connected. . 2017.06.19 01:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:03:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:11:09 - Updating systems & servers data ... . 2017.06.19 01:11:10 - Systems & servers data update completed . 2017.06.19 01:21:13 - Updating systems & servers data ... . 2017.06.19 01:21:14 - Systems & servers data update completed ! 2017.06.19 01:24:32 - Disconnecting . 2017.06.19 01:24:32 - Management - Send 'signal SIGTERM' . 2017.06.19 01:24:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:24:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 91.231.84.39 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:24:37 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:24:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:24:37 - Connection terminated. . 2017.06.19 01:24:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:24:37 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:24:37 - Checking authorization ... ! 2017.06.19 01:24:38 - Connecting to Gomeisa (Sweden, Uppsala) . 2017.06.19 01:24:38 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:24:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:24:38 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:24:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:24:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:24:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:24:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:24:38 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:24:38 - OpenVPN > UDP link remote: [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:38 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=709b80a1 527c7531 . 2017.06.19 01:24:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:24:38 - OpenVPN > Validating certificate key usage . 2017.06.19 01:24:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:24:38 - OpenVPN > VERIFY KU OK . 2017.06.19 01:24:38 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:24:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:24:38 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:24:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gomeisa, emailAddress=info@airvpn.org . 2017.06.19 01:24:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:24:38 - OpenVPN > [Gomeisa] Peer Connection Initiated with [AF_INET]62.102.148.132:443 . 2017.06.19 01:24:39 - OpenVPN > SENT CONTROL [Gomeisa]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:24:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.21 255.255.0.0,peer-id 11,cipher AES-256-GCM' . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 01:24:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 01:24:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:24:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:24:39 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:24:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:24:39 - OpenVPN > open_tun . 2017.06.19 01:24:40 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:24:40 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:24:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.21/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:24:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.21/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:24:40 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:24:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:24:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:24:44 - Starting Management Interface . 2017.06.19 01:24:44 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:24:44 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:24:44 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:24:44 - Flushing DNS I 2017.06.19 01:24:47 - Checking route I 2017.06.19 01:24:50 - Checking DNS ! 2017.06.19 01:25:02 - Connected. . 2017.06.19 01:25:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:25:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:26:11 - OpenVPN > write UDP: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2017.06.19 01:27:00 - Above log line repeated 26 times more ! 2017.06.19 01:27:00 - Disconnecting . 2017.06.19 01:27:00 - Management - Send 'signal SIGTERM' . 2017.06.19 01:27:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:27:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.1.1 W 2017.06.19 01:27:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:27:05 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:27:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:27:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:27:05 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:27:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:27:05 - Connection terminated. . 2017.06.19 01:27:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:27:05 - DNS leak protection with packet filtering disabled. . 2017.06.19 01:27:05 - IPv6 restored with packet filtering. . 2017.06.19 01:27:05 - Flushing DNS ! 2017.06.19 01:27:08 - Session terminated. I 2017.06.19 01:27:09 - Session starting. . 2017.06.19 01:27:09 - IPv6 disabled with packet filtering. I 2017.06.19 01:27:24 - Checking authorization ... ! 2017.06.19 01:27:24 - Connecting to Alchiba (Netherlands, Alblasserdam) . 2017.06.19 01:27:27 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:27:27 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:27:27 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:27:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:27:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:27:27 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:27:27 - OpenVPN > UDP link remote: [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=9ef08779 1093a45a . 2017.06.19 01:27:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:27:27 - OpenVPN > Validating certificate key usage . 2017.06.19 01:27:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:27:27 - OpenVPN > VERIFY KU OK . 2017.06.19 01:27:27 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:27:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:27:27 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:27:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:27:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:27:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 . 2017.06.19 01:27:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:27:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.113.161 255.255.0.0' . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:27:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:27:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:27:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:27:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:27:27 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:27:27 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:27:27 - OpenVPN > open_tun . 2017.06.19 01:27:27 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:27:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:27:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.113.161/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:27:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.113.161/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:27:27 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:27:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:27:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.180 MASK 255.255.255.255 192.168.43.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:27:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:27:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:27:31 - Starting Management Interface . 2017.06.19 01:27:31 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:27:31 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:27:31 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:27:31 - Flushing DNS I 2017.06.19 01:27:35 - Checking route I 2017.06.19 01:27:35 - Checking DNS ! 2017.06.19 01:27:48 - Connected. . 2017.06.19 01:27:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:27:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2017.06.19 01:29:04 - Disconnecting . 2017.06.19 01:29:04 - Management - Send 'signal SIGTERM' . 2017.06.19 01:29:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:29:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.180 MASK 255.255.255.255 192.168.43.1 W 2017.06.19 01:29:09 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.43.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:29:09 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:29:09 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:29:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:29:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:29:09 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:29:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:29:09 - Connection terminated. . 2017.06.19 01:29:09 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:29:09 - DNS leak protection with packet filtering disabled. . 2017.06.19 01:29:09 - IPv6 restored with packet filtering. . 2017.06.19 01:29:09 - Flushing DNS ! 2017.06.19 01:29:12 - Session terminated. ! 2017.06.19 01:29:16 - Deactivation of Network Lock ! 2017.06.19 01:30:06 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 01:30:08 - Session starting. . 2017.06.19 01:30:08 - IPv6 disabled with packet filtering. I 2017.06.19 01:30:08 - Checking authorization ... ! 2017.06.19 01:30:08 - Connecting to Muscida (Netherlands, Alblasserdam) . 2017.06.19 01:30:11 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:30:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:30:11 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:30:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:30:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:30:11 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:30:11 - OpenVPN > UDP link remote: [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.153:443, sid=ac0b5f83 28fed3da . 2017.06.19 01:30:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:30:11 - OpenVPN > Validating certificate key usage . 2017.06.19 01:30:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:30:11 - OpenVPN > VERIFY KU OK . 2017.06.19 01:30:11 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:30:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:30:11 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:30:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:30:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:30:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.153:443 . 2017.06.19 01:30:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.112.39 255.255.0.0' . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:30:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:30:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:30:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:30:11 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:30:11 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:30:11 - OpenVPN > open_tun . 2017.06.19 01:30:11 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:30:11 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:30:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.112.39/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:30:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.112.39/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:30:11 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:30:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:30:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.153 MASK 255.255.255.255 192.168.43.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:30:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:30:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:30:15 - Starting Management Interface . 2017.06.19 01:30:15 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:30:15 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:30:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:30:15 - Flushing DNS I 2017.06.19 01:30:18 - Checking route I 2017.06.19 01:30:19 - Checking DNS ! 2017.06.19 01:30:31 - Connected. . 2017.06.19 01:30:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:30:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:30:38 - OpenVPN > write UDP: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2017.06.19 01:31:17 - Updating systems & servers data ... . 2017.06.19 01:31:31 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.06.19 01:31:31 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.06.19 01:31:31 - OpenVPN > Restart pause, 5 second(s) ! 2017.06.19 01:31:31 - Disconnecting . 2017.06.19 01:31:31 - Management - Send 'signal SIGTERM' . 2017.06.19 01:31:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.153 MASK 255.255.255.255 192.168.43.1 W 2017.06.19 01:31:31 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.43.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2017.06.19 01:31:31 - OpenVPN > Route deletion fallback to route.exe . 2017.06.19 01:31:31 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:31:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:31:31 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:31:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2017.06.19 01:31:31 - Connection terminated. . 2017.06.19 01:31:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:31:31 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:31:34 - Checking authorization ... ! 2017.06.19 01:31:34 - Connecting to Salm (Netherlands, Alblasserdam) . 2017.06.19 01:31:34 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:31:34 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:31:34 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:31:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:31:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:31:34 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:31:34 - OpenVPN > UDP link remote: [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.19:443, sid=da8f8bd9 1d0fc6fd . 2017.06.19 01:31:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:31:34 - OpenVPN > Validating certificate key usage . 2017.06.19 01:31:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:31:34 - OpenVPN > VERIFY KU OK . 2017.06.19 01:31:34 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:31:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:31:34 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:31:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.19 01:31:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:31:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.19:443 . 2017.06.19 01:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.112.242 255.255.0.0' . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:31:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:31:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 01:31:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:31:36 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:31:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:31:36 - OpenVPN > open_tun . 2017.06.19 01:31:36 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:31:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:31:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.112.242/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:31:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.112.242/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:31:36 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:31:36 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:31:37 - Systems & servers data update completed . 2017.06.19 01:31:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.19 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:31:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:31:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:31:41 - Starting Management Interface . 2017.06.19 01:31:41 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:31:41 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:31:41 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:31:41 - Flushing DNS I 2017.06.19 01:31:44 - Checking route I 2017.06.19 01:31:47 - Checking DNS ! 2017.06.19 01:32:01 - Connected. . 2017.06.19 01:32:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:32:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 01:41:39 - Updating systems & servers data ... . 2017.06.19 01:41:42 - Systems & servers data update completed . 2017.06.19 01:51:45 - Updating systems & servers data ... . 2017.06.19 01:51:47 - Systems & servers data update completed ! 2017.06.19 01:54:13 - Disconnecting . 2017.06.19 01:54:13 - Management - Send 'signal SIGTERM' . 2017.06.19 01:54:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 01:54:13 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.19 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 01:54:18 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 01:54:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 01:54:18 - Connection terminated. . 2017.06.19 01:54:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 01:54:18 - DNS leak protection with packet filtering disabled. I 2017.06.19 01:54:18 - Checking authorization ... ! 2017.06.19 01:54:18 - Connecting to Cervantes (Germany, Frankfurt) . 2017.06.19 01:54:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 01:54:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 01:54:18 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 01:54:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 01:54:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:54:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 01:54:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 01:54:18 - OpenVPN > UDP link local: (not bound) . 2017.06.19 01:54:18 - OpenVPN > UDP link remote: [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:18 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.26:443, sid=bb525f22 c266d0f5 . 2017.06.19 01:54:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 01:54:18 - OpenVPN > Validating certificate key usage . 2017.06.19 01:54:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 01:54:18 - OpenVPN > VERIFY KU OK . 2017.06.19 01:54:18 - OpenVPN > Validating certificate extended key usage . 2017.06.19 01:54:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 01:54:18 - OpenVPN > VERIFY EKU OK . 2017.06.19 01:54:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cervantes, emailAddress=info@airvpn.org . 2017.06.19 01:54:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 01:54:19 - OpenVPN > [Cervantes] Peer Connection Initiated with [AF_INET]185.189.112.26:443 . 2017.06.19 01:54:20 - OpenVPN > SENT CONTROL [Cervantes]: 'PUSH_REQUEST' (status=1) . 2017.06.19 01:54:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.177 255.255.0.0,peer-id 3,cipher AES-256-GCM' . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 01:54:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 01:54:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:54:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 01:54:20 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 01:54:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 01:54:20 - OpenVPN > open_tun . 2017.06.19 01:54:20 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 01:54:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 01:54:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.177/255.255.0.0 [sUCCEEDED] . 2017.06.19 01:54:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.177/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 01:54:20 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 01:54:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 01:54:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 185.189.112.26 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 01:54:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 01:54:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 01:54:25 - Starting Management Interface . 2017.06.19 01:54:25 - OpenVPN > Initialization Sequence Completed . 2017.06.19 01:54:25 - DNS leak protection with packet filtering enabled. . 2017.06.19 01:54:25 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 01:54:25 - Flushing DNS I 2017.06.19 01:54:28 - Checking route I 2017.06.19 01:54:28 - Checking DNS ! 2017.06.19 01:54:41 - Connected. . 2017.06.19 01:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 01:54:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 02:01:50 - Updating systems & servers data ... . 2017.06.19 02:01:52 - Systems & servers data update completed ! 2017.06.19 02:04:40 - Disconnecting . 2017.06.19 02:04:40 - Management - Send 'signal SIGTERM' . 2017.06.19 02:04:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 02:04:40 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.189.112.26 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:04:45 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 02:04:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 02:04:45 - Connection terminated. . 2017.06.19 02:04:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 02:04:45 - DNS leak protection with packet filtering disabled. . 2017.06.19 02:04:45 - IPv6 restored with packet filtering. . 2017.06.19 02:04:45 - Flushing DNS ! 2017.06.19 02:04:48 - Session terminated. ! 2017.06.19 02:04:48 - Deactivation of Network Lock I 2017.06.19 02:04:50 - Session starting. . 2017.06.19 02:04:50 - IPv6 disabled with packet filtering. I 2017.06.19 02:04:50 - Checking authorization ... ! 2017.06.19 02:04:50 - Connecting to Capricornus (Belgium, Brussels) . 2017.06.19 02:04:50 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:04:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:04:50 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:04:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:04:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:04:50 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:04:50 - OpenVPN > UDP link remote: [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:50 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=8ab7c700 158c263d . 2017.06.19 02:04:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:04:50 - OpenVPN > Validating certificate key usage . 2017.06.19 02:04:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:04:50 - OpenVPN > VERIFY KU OK . 2017.06.19 02:04:50 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:04:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:04:50 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:04:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org . 2017.06.19 02:04:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:04:51 - OpenVPN > [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 . 2017.06.19 02:04:52 - OpenVPN > SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:04:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.185 255.255.0.0' . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:04:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:04:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:04:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:04:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:04:52 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:04:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:04:52 - OpenVPN > open_tun . 2017.06.19 02:04:52 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:04:52 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:04:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.185/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:04:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.185/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:04:52 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:04:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 02:04:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:04:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:04:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:04:57 - Starting Management Interface . 2017.06.19 02:04:57 - OpenVPN > Initialization Sequence Completed . 2017.06.19 02:04:57 - DNS leak protection with packet filtering enabled. . 2017.06.19 02:04:57 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 02:04:57 - Flushing DNS I 2017.06.19 02:05:00 - Checking route I 2017.06.19 02:05:00 - Checking DNS ! 2017.06.19 02:05:13 - Connected. . 2017.06.19 02:05:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.19 02:05:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.06.19 02:11:54 - Disconnecting . 2017.06.19 02:11:54 - Management - Send 'signal SIGTERM' . 2017.06.19 02:11:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.19 02:11:54 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.06.19 02:11:55 - Updating systems & servers data ... . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:11:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.19 02:11:59 - OpenVPN > Closing TUN/TAP interface . 2017.06.19 02:11:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.06.19 02:11:59 - Connection terminated. . 2017.06.19 02:11:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) . 2017.06.19 02:11:59 - DNS leak protection with packet filtering disabled. . 2017.06.19 02:11:59 - IPv6 restored with packet filtering. . 2017.06.19 02:11:59 - Flushing DNS ! 2017.06.19 02:12:02 - Session terminated. . 2017.06.19 02:12:06 - Systems & servers data update completed ! 2017.06.19 02:12:07 - Activation of Network Lock - Windows Filtering Platform I 2017.06.19 02:12:08 - Session starting. . 2017.06.19 02:12:08 - IPv6 disabled with packet filtering. I 2017.06.19 02:12:08 - Checking authorization ... ! 2017.06.19 02:12:08 - Connecting to Errai (Germany, Frankfurt) . 2017.06.19 02:12:09 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:12:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:12:09 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:12:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:12:09 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:12:09 - OpenVPN > UDP link remote: [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:09 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.10:443, sid=dc088575 49b8b3cc . 2017.06.19 02:12:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:12:09 - OpenVPN > Validating certificate key usage . 2017.06.19 02:12:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:12:09 - OpenVPN > VERIFY KU OK . 2017.06.19 02:12:09 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:12:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:12:09 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:12:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2017.06.19 02:12:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:12:09 - OpenVPN > [Errai] Peer Connection Initiated with [AF_INET]185.189.112.10:443 . 2017.06.19 02:12:10 - OpenVPN > SENT CONTROL [Errai]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:12:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.196 255.255.0.0,peer-id 9,cipher AES-256-GCM' . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.19 02:12:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.19 02:12:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 02:12:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.19 02:12:10 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:12:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:12:10 - OpenVPN > open_tun . 2017.06.19 02:12:10 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:12:10 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:12:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.196/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:12:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.196/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:12:10 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:12:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 ! 2017.06.19 02:12:11 - Disconnecting . 2017.06.19 02:12:11 - Connection terminated. I 2017.06.19 02:12:11 - Cancel requested. . 2017.06.19 02:12:11 - IPv6 restored with packet filtering. . 2017.06.19 02:12:11 - Flushing DNS ! 2017.06.19 02:12:15 - Session terminated. I 2017.06.19 02:12:18 - Session starting. . 2017.06.19 02:12:18 - IPv6 disabled with packet filtering. I 2017.06.19 02:12:18 - Checking authorization ... ! 2017.06.19 02:12:18 - Connecting to Capricornus (Belgium, Brussels) . 2017.06.19 02:12:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.19 02:12:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.19 02:12:18 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.19 02:12:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.19 02:12:18 - OpenVPN > UDP link local: (not bound) . 2017.06.19 02:12:18 - OpenVPN > UDP link remote: [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:18 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=bfbedb9f 3db46e37 . 2017.06.19 02:12:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.19 02:12:18 - OpenVPN > Validating certificate key usage . 2017.06.19 02:12:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.19 02:12:18 - OpenVPN > VERIFY KU OK . 2017.06.19 02:12:18 - OpenVPN > Validating certificate extended key usage . 2017.06.19 02:12:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.19 02:12:18 - OpenVPN > VERIFY EKU OK . 2017.06.19 02:12:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org . 2017.06.19 02:12:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.19 02:12:18 - OpenVPN > [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 . 2017.06.19 02:12:19 - OpenVPN > SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) . 2017.06.19 02:12:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.185 255.255.0.0' . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.19 02:12:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.19 02:12:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:12:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.19 02:12:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.19 02:12:19 - OpenVPN > interactive service msg_channel=0 . 2017.06.19 02:12:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=30:e3:7a:ea:a2:22 . 2017.06.19 02:12:19 - OpenVPN > open_tun . 2017.06.19 02:12:20 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5AB39F01-15E6-4AA7-9421-C022484C9D5A}.tap . 2017.06.19 02:12:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.19 02:12:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.185/255.255.0.0 [sUCCEEDED] . 2017.06.19 02:12:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.185/255.255.0.0 on interface {5AB39F01-15E6-4AA7-9421-C022484C9D5A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.19 02:12:20 - OpenVPN > Successful ARP Flush on interface [46] {5AB39F01-15E6-4AA7-9421-C022484C9D5A} . 2017.06.19 02:12:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.19 02:12:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.90 MASK 255.255.255.255 192.168.1.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.19 02:12:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.06.19 02:12:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.19 02:12:24 - Starting Management Interface . 2017.06.19 02:12:24 - OpenVPN > Initialization Sequence Completed . 2017.06.19 02:12:24 - DNS leak protection with packet filtering enabled. . 2017.06.19 02:12:24 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) . 2017.06.19 02:12:24 - Flushing DNS I 2017.06.19 02:12:28 - Checking route I 2017.06.19 02:12:28 - Checking DNS ! 2017.06.19 02:12:42 - Connected. . 2017.06.19 02:12:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.19 02:12:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Thank you for your help
  9. Hi. I configured Eddie so that the IPs of certain websites are accessed only from outside the VPN tunnel. (Settings -> Routes) These routing rules work just fine, but as soon as I activate network lock I can't access the specified sites anymore. I can ping them, but I can't access them inside the browser. They basically get blocked. I tried multiple versions of Eddie (2.12.4, 2.11.15, 2.10.39, various protocols and ports and of course various websites. I also tried both methods for network lock (Windows Firewall & Windows Filtering Platform). I'm having this issue on both Windows 7 and Windows 10. Any ideas how to fix this? Anyone else having this problem? Please, if you have any idea at all on how to fix this, let me know. I really need both network lock and routing rules to work simultaneously.
  10. Hey there, I can't seem to establish a connection to my local devices (e. g. router, NAS, etc.) with engaged network lock, even though "allow private/local traffic" is enabled in the preferences. I'm using latest stable version of Eddie on Win 10. Network lock is the only reliable way to prevent DNS leak (as tested on your IP/DNS leak test site), so it is not an option to just not engage it. I tried to route traffic to local IP's via rules, but to no avail. What am I missing? Cheers!
  11. I have been using Air/Eddie for about 1.5 years, never had an issue like this. I was looking for a torrent, so I turned on my PC, activated network lock and connected to recommended server, all just like normal. I couldn't find what I was looking for, so I was just going to watch a show on Netflix. So I disconnected, and turned off the network lock, and then closed Eddie. Once disconnected, I realized, that now, without the VPN connected, my internet didn't work (as if the network lock was still on), so I reopened, Eddie to confirm it was not activated, and it is not. I restarted the PC, no change, still no internet access, Re-open Eddie, and cycle network lock on and off, no change, connect to Recommended server, and everything is working fine, disconnect, no network lock, still no internet. I have confirmed my IPv4 is set to Auto (which I saw as a suggestion to a similar sounding issue). Eddie version is 2.10.3 Thanks for any help you can offer.
  12. Hey, everyone: Not sure if this is the best place to post this or not, or if this is being discussed elsewhere; I tried to search for topics related to this, but couldn't find anything, so I figured I'd start my own. If it needs to be moved or is already being discussed, please change it, or let me know where I can find the information. I'm not really a fan of Windows 10 firewall, and was hoping there is now a way to use Network lock with Kaspersky firewall? I know a year or so ago, there wasn't really a way, but now I'm seeing something about "Windows Filtering Platform" to help with that? What is WFP? Is there a way to get Eddie and the Network Lock to work with Kaspersky? If so, how would I go about setting it up, and testing to make sure it's setup correctly? If not, how can I make sure that my Network Lock and Kaspersky aren't interfering with one another and are setup correctly? Thank you, Kevin
  13. The new default Network Lock breaks Plex media server connection to the web. The ports do not successfully forward. I have to revert back to Windows firewall mode for the ports to successfully forward. Is there a way that I can get Plex to work with the new Network lock or should I using firewall mode instead?
  14. Hi Anyone else having an issue connecting to the internet when Network Lock is activated on Ubuntu 16.10. Works ok without Network Lock but when activated my connection drops and I can't access any sites Does Network Lock not work on Ubuntu? Any help would be appreciated Aloha Sine
  15. HI I recently upgraded to Eddie 2.11.15 and have noticed that after disconnecting from the VPN , the network lock feature does not work correctly . Although the network lock blocks access to the internet it fails to prevent DNS requests leaving the local adapter (i.e 192.168.1.*) The old Eddie client's network lock prevented this by maintaining the Airvpn DNS config on the local adapter. I realize that one of the "features of the new client is that it no longer uses windows firewall, don't know if this is the reason for the DNS problem but looks as though I will have to use some kind of script in the "session end" external shell to correct the DNS issue . Unless I have missed something. I am using DNSEye to monitor the DNS requests I am seeing after the vpn session ends.
  16. Hi all, I have a little problem. I try to tell it with my terrible English. So i like to setup this VPN(airvpn client) >>> SOCKS PROXY>>> Browsers and others, virtual machines etc... (all socks traffic over vpn). The host os is linux.
  17. I would like to suggest an additional Eddie configuration option where someone could set an option similar to the existing "Activate Network Lock at startup", but that triggers on the user connecting/disconnecting. For example, with this option set (let's call it "Sync Network Lock with VPN Connection"): Launch or Restore (previously minimized) Eddie and log in Click the Connect to a recommended server button Network Lock is auto-activated VPN connection is established I do what I need on the VPN Close my VPN connection Network Lock is Auto-deactivated Minimize/Close EddieIf I was a user of the "Connect at startup" option, then I would appreciate and use the "Activate Network Lock at startup" options as they compliment each other. Since I like to launch and keep Eddie open all the time (usually minimized to the systems tray) until I want to establish a VPN connection, it would suit my usage style better if this new option was added, and remove my need to remember to enable/disable NL. Hopefully others would find this useful as well.
  18. Hello, I've recently installed OpenVPN for Android (the open-source recommended choice) but I'm concerned about different issues. For instance, this app doesn't autostart at boot / reboot but has to be manually started. BTW Android uses wifi's previous state after reboot : when Wifi was "on" our real IP is visible until OpenVPN is manually started. When it crashes (it happens with the latest version) our real IP gets exposed too. I wonder if it could be possible to configure a firewall (AfWall+ or Droidwall) to block all the traffic excepting the one which transits through OpenVPN for both Wifi and data (3G/4G) ? These two apps are using iptables but I don't know how to write the custom rules matching my requirements. The help and knowledge of some computer savvy members would be appreciated. If it works we could maybe create a tutorial for the "How to" section of this forum ? I've collected several articles regarding Android and iptables but I've no idea how I could adapt all this for AirVPN .ovpn default config file (Europe). https://android.stackexchange.com/questions/14455/how-can-i-block-the-traffic-outside-the-vpn-even-if-the-vpn-is-down https://github.com/ukanth/afwall/wiki/Apps-leak-private-user-data-during-boot https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy https://droidvpn.com/page/stopping-leaks-with-droidwall-when-using-droidvpn-8/ https://airvpn.org/faq/software_lock/ Any idea ? Thanks
  19. Hi there, I just had a question about Network Lock. I turned it on when I use torrents and to make myself more secure / private. However, I also have some public shared folders on this computer with my local network. This is so my Roku/WDTV Live can grab movie / TV show files and play it on the television in the other room. It seems when Network Lock is enabled, the Advanced Sharing settings for the network on Windows 8 automatically turns OFF the Network Discover and File sharing buttons. When I enable then and click save, then go back into the settings they are turned off again - this is when AirVPN is running and Network Lock is turned ON. So it makes the devices in the other rooms unable to find the files on this computer using the local network when I am using the VPN. I was wondering if it possible to somehow make the local network files accessible to other computers when AirVPN is running with the Network Lock enabled? Right now through AirVPN it doesn't seem to be possible, i'm wondering if there is a work around available? Or could the local network settings be loosened up slightly in future AirVPN versions? I'm assuming local network sharing won't impact identity on the internet when using the VPN? Thanks for the help,
  20. Hello, I have a question that maybe someone more knowledgeable can answer. I have a computer at home that runs airvpn client and a remote computer. I want to be able to connect from either computer to another one with ssh. Without airvpn client, everything works (obviously). If I run airvpn without network lock, I can ssh from home to remote (it goes via the AirVPN server) but not from remote to home. I tried to start airvpn with the parameter "routes.custom=my.remote.ip.addr,255.255.255.255,out" but it didn't help - the required route was not added to the routing table. However, that problem was easily solved: I added the route separately with "route add -host my.remote.ip.address gw 192.168.1.1" and all was well: ssh works from home to remote and from remote to home bypassing AirVPN as I want it to do. Now, I enable network lock. This time I need to add "allowed IP" parameter to be able to ssh from home to remote: ./airvpn -cli -connect -netlock -login=**** password=**** netlock.allowed_ips=my.remote.ip.addr But ssh from remote to home is blocked by the firewall. I can't find any airvpn parameter that can be used to create custom firewall rules. So I ended up with adding the required rule myself. Before: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 177 16717 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 93 8963 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 26 4651 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1890 460K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 6 502 DROP all -- any any anywhere anywhere Add the rule: iptables -t filter -I INPUT 9 -i eth0 -p tcp -s my.remote.ip.addr --dport 22 -j ACCEPT After: # iptables -L -v --line-numbers Chain INPUT (policy ACCEPT 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 182 17197 ACCEPT all -- lo any anywhere anywhere 2 0 0 ACCEPT all -- any any 255.255.255.255 anywhere 3 107 10296 ACCEPT all -- any any 192.168.0.0/16 192.168.0.0/16 4 41 6945 ACCEPT all -- any any 10.0.0.0/8 10.0.0.0/8 5 0 0 ACCEPT all -- any any 172.16.0.0/12 172.16.0.0/12 6 0 0 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 7 1981 480K ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 8 0 0 ACCEPT all -- tun+ any anywhere anywhere 9 0 0 ACCEPT tcp -- eth0 any my.remote.ip.addr anywhere tcp dpt:22 10 6 502 DROP all -- any any anywhere anywhere Now everything works again, but the question remains: what is the best way to achieve that ? In the worst case scenario, I can just start airvpn in the background, wait a minute or so and then run iptables with my additional rule. But that looks ugly. Can anyone think of a better way ? Maybe some "event.session..." or "event.vpn..." parameter will do the trick ? Thanks for any help.
  21. hello there when deactivate network lock and exit from Eddie on windows 7 I don't have internet any help Thank you
  22. Hello all, I recently activate the network lock option on the AirVPN client (2 months ago), but unfortunately since i activate this option the Windows Update Center can't load and install anymore new update of windows. Furthermore, if I shut down the Airvpn client I can't connect on network, even if deactivate network lock, shutdown windows firewall and antivirus. I uninstall the Arivpn client, no effect. I used the windows recovery mode and choose a date before activation of the network lock option...same, no effect. All is runing like the network lock frozed my windows firewall in "no exchange mode", even in deactivate the firewall. So I'm here to find some help, because I absolutely don't know how to resolve this problem and now my windows os is out of date. Thanks for your help. PS: operating system -> Windows Vista Home premium 64 bits SP2 Airvpn clent: 2.10.3
  23. Hi, im using AirVpn since months and never really had problems. I always use the network lock and SSL Tunnel, but since 4 days i cant connect to any server when the network lock is on, it always disconnects instantly once i select a server and it tries to connect. I can connect to servers without problems, when im NOT using network lock, same speed and everything as before.
  24. Hello, I am newish here, and am not too technical. Running Eddie on OS X 10.11.6 with Network Lock on. Was running great, then, yesterday, noticed that connection had been lost, and tried to reconnect, but,continually got stuck on the "Checking Routes". Had to quit and re-start Eddie to get reconnected. I'd prefer to run with Network lock on, but can not stay connected with the Network Lock on. Obviously, while I quit and restart, I'm not running VPN... I have no idea what to do to help with this issue. I know this may be too vague, but, I'm simply not too technical to know where to begin. I apologize if this is already covered. I've tried looking through the forums, but, can't find this, or understand how to run with OS X so it will reconnect when the connection is lost while running the Network Lock on. Is there any way to start Network lock if it is off and Eddie is already running without having to restart? Thank you
  25. Hello I have a question about the OSX Power Nap feature. Does the network lock work when Power Nap is enabled in osx? Or does the IP leak during a Power Nap?
×
×
  • Create New...