Search the Community
Showing results for tags 'Problem'.
Found 39 results
-
Hello everyone, I just made an account for AirVPN and firstly installed it on my laptop (Win 11), where it immediately worked without any issue. I then proceeded to install it to my PC (Win 10) but it won't connect to any server. Both times i downloaded the Eddie client for Windows 10/11, 64bit, Installer with GUI from the website. I already checked the VPN settings and they're the exact same, so it probably has something to do with the Windows settings, but i have no clue as to what exactly it could be. As stated in the title my PC is directly connected to my Router via cable while I use my Laptop via WLAN. Googling the issue has brought me to threads where people have a similar problem to mine but none of the solutions have worked for me thus far. Here are the logs for comparison, trying to connect to the exact same server Andromeda (Netherlands): PC Log I 2024.10.12 16:45:10 - Session starting. I 2024.10.12 16:45:10 - Checking authorization ... . 2024.10.12 16:45:11 - Added new network interface "Eddie", Wintun version 0.14 . 2024.10.12 16:45:11 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.10.12 16:45:11 - Connecting to Andromeda (Netherlands, Alblasserdam) . 2024.10.12 16:45:11 - Routes, add 213.152.161.231/32 for interface "Ethernet (Broadcom NetXtreme 57xx Gigabit Controller)". . 2024.10.12 16:45:11 - Routes, add 213.152.161.231/32 for interface "Ethernet (Broadcom NetXtreme 57xx Gigabit Controller)", already exists. . 2024.10.12 16:45:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.10.12 16:45:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.10.12 16:45:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.10.12 16:45:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:45:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:45:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:45:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:45:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.231:443 . 2024.10.12 16:45:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.10.12 16:45:11 - OpenVPN > UDP link local: (not bound) . 2024.10.12 16:45:11 - OpenVPN > UDP link remote: [AF_INET]213.152.161.231:443 . 2024.10.12 16:45:44 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2024.10.12 16:45:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.10.12 16:45:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.10.12 16:45:49 - Disconnecting Laptop Log I 2024.10.12 16:39:03 - Session starting. I 2024.10.12 16:39:03 - Checking authorization ... . 2024.10.12 16:39:05 - Added new network interface "Eddie", Wintun version 0.12 . 2024.10.12 16:39:05 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.10.12 16:39:05 - Connecting to Andromeda (Netherlands, Alblasserdam) . 2024.10.12 16:39:05 - Routes, add 213.152.161.231/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.10.12 16:39:05 - Routes, add 213.152.161.231/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.10.12 16:39:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.10.12 16:39:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.10.12 16:39:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.10.12 16:39:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:39:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:39:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.10.12 16:39:06 - OpenVPN > UDP link local: (not bound) . 2024.10.12 16:39:06 - OpenVPN > UDP link remote: [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.231:443, sid=68d94654 f1ea56c8 . 2024.10.12 16:39:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.10.12 16:39:06 - OpenVPN > VERIFY KU OK . 2024.10.12 16:39:06 - OpenVPN > Validating certificate extended key usage . 2024.10.12 16:39:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.10.12 16:39:06 - OpenVPN > VERIFY EKU OK . 2024.10.12 16:39:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Andromeda, emailAddress=info@airvpn.org . 2024.10.12 16:39:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.10.12 16:39:06 - OpenVPN > [Andromeda] Peer Connection Initiated with [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > SENT CONTROL [Andromeda]: 'PUSH_REQUEST' (status=1) . 2024.10.12 16:39:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.22.1,dhcp-option DNS6 fde6:7a:7d20:516::1,tun-ipv6,route-gateway 10.9.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:516::107f/64 fde6:7a:7d20:516::1,ifconfig 10.9.22.129 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.22.1' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:516::1' . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.10.12 16:39:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.10.12 16:39:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > interactive service msg_channel=0 . 2024.10.12 16:39:06 - OpenVPN > open_tun . 2024.10.12 16:39:06 - OpenVPN > wintun device [Eddie] opened . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 20 static 10.9.22.129 255.255.255.0 . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 20 all . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 20 all . 2024.10.12 16:39:06 - OpenVPN > IPv4 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 20 fde6:7a:7d20:516::107f/128 store=active . 2024.10.12 16:39:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:516::/64 -> fde6:7a:7d20:516::107f metric 0) dev Eddie . 2024.10.12 16:39:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:516::/64 20 fe80::8 store=active . 2024.10.12 16:39:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.10.12 16:39:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 20 all . 2024.10.12 16:39:07 - OpenVPN > IPv6 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2024.10.12 16:39:07 - OpenVPN > Initialization Sequence Completed . 2024.10.12 16:39:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.10.12 16:39:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.10.12 16:39:07 - DNS leak protection with packet filtering enabled. . 2024.10.12 16:39:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.9.22.1) . 2024.10.12 16:39:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:516::1) . 2024.10.12 16:39:08 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:08 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:08 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 213.152.161.229/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 2a00:1678:2470:46:87f7:5087:ccb3:f7e2/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Flushing DNS I 2024.10.12 16:39:09 - Checking route IPv4 I 2024.10.12 16:39:10 - Checking route IPv6 I 2024.10.12 16:39:10 - Checking DNS ! 2024.10.12 16:39:10 - Connected.
-
Hey folks, I wanted to give Asahi Linux a shot and tried to install the Eddie Client on my machine. When starting the program, the UI is presented to me as a black window (which can't be closed). Any ideas what the issue might be? Thanks in advance and best regards
-
Hello For several months I have been using AirVPN on my Windows 10 machine. Before the PC started and AirVPN launched without problem. Since a Windows update some time ago (https://www.it-connect.fr/microsoft-windows-vpn-ne-fonctionne-plus-mise-a-jour-avril-2024/) most of the time AirVPN blocks. I have to launch the task manager and stop the "OpenVPN Daemon" process so that it continues to start. I have of course done all the Windows updates since then but that did not solve the problem. I also tried to follow the procedure indicated in the article above but I cannot find the offending KB. I also tried to uninstall and reinstall AirVPN but that did not solve anything. Has anyone found the solution? Thank you very much! 😉
-
HI fellow AirVpn members, AirVpn is new to me I just bought the yearly plan, and I am having some issues regarding protocols, if I leave the protocol on automatic, it tries to connect, after something like 20 seconds, it says restart and tries another server, however that does not change anything. When I would choose any of the wireguard protocols everything works fine. Is this an openvpn Adapter problem? What is going wrong? I included a screenshot of the network adapters installed on my windows laptop I am using Eddie - UI with administrator privileges Version 2.21.8 I also have OpenVpn Connect installed on my computer Thank you in advance, CR0N0S
-
Hello, Today my AirVPN just stopped working. For some reason, the connection process stops at "Checking route IPv4" and it takes forever Here's the log I 2023.09.05 16:56:56 - Session starting. I 2023.09.05 16:56:56 - Checking authorization ... . 2023.09.05 16:56:57 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 16:56:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 16:56:57 - Connecting to Talitha (Netherlands, Alblasserdam) . 2023.09.05 16:56:57 - Routes, add 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:56:57 - Routes, add 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 16:56:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 16:56:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 16:56:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 16:56:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:56:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:56:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:56:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:56:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 16:56:57 - OpenVPN > UDP link local: (not bound) . 2023.09.05 16:56:57 - OpenVPN > UDP link remote: [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.140:443, sid=fbc08c94 fb5570a0 . 2023.09.05 16:56:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 16:56:57 - OpenVPN > VERIFY KU OK . 2023.09.05 16:56:57 - OpenVPN > Validating certificate extended key usage . 2023.09.05 16:56:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 16:56:57 - OpenVPN > VERIFY EKU OK . 2023.09.05 16:56:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2023.09.05 16:56:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 16:56:57 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.18.1,dhcp-option DNS6 fde6:7a:7d20:1b12::1,tun-ipv6,route-gateway 10.31.18.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b12::1061/64 fde6:7a:7d20:1b12::1,ifconfig 10.31.18.99 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.18.1' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b12::1' . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 16:56:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 16:56:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:56:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:56:58 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 16:56:58 - OpenVPN > open_tun . 2023.09.05 16:56:58 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.31.18.99 255.255.255.0 . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 16:56:58 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1b12::1061/128 store=active . 2023.09.05 16:56:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b12::/64 -> fde6:7a:7d20:1b12::1061 metric 0) dev Eddie . 2023.09.05 16:56:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b12::/64 28 fe80::8 store=active . 2023.09.05 16:56:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 16:56:58 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:56:58 - OpenVPN > Initialization Sequence Completed . 2023.09.05 16:56:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 16:56:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 16:56:58 - DNS leak protection with packet filtering enabled. . 2023.09.05 16:56:58 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.31.18.1) . 2023.09.05 16:56:58 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:58 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.31.18.1) . 2023.09.05 16:56:59 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:59 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.31.18.1) . 2023.09.05 16:56:59 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 213.152.161.138/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 2a00:1678:2470:6:6f0d:8828:9fc4:bbdd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Flushing DNS I 2023.09.05 16:56:59 - Checking route IPv4 . 2023.09.05 16:57:26 - Checking route (4° try) . 2023.09.05 16:57:52 - Checking route (5° try) E 2023.09.05 16:58:13 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2023.09.05 16:58:13 - Disconnecting . 2023.09.05 16:58:13 - Sending soft termination signal . 2023.09.05 16:58:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 16:58:17 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 16:58:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1b12::/64) . 2023.09.05 16:58:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1b12::/64 28 fe80::8 store=active . 2023.09.05 16:58:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1b12::1061 store=active . 2023.09.05 16:58:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.31.18.99 store=active . 2023.09.05 16:58:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 16:58:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.138/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 2a00:1678:2470:6:6f0d:8828:9fc4:bbdd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:58:18 - DNS leak protection with packet filtering disabled. . 2023.09.05 16:58:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 16:58:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 16:58:18 - Connection terminated. I 2023.09.05 16:58:19 - Cancel requested. ! 2023.09.05 16:58:19 - Session terminated. . 2023.09.05 17:09:35 - Collect information about AirVPN completed
-
. 2023.07.19 19:20:10 - Above log line repeated 16 times more I 2023.07.19 19:20:10 - Session starting. I 2023.07.19 19:20:10 - Checking authorization ... . 2023.07.19 19:20:11 - Added new network interface "eddie", Wintun version 0.12 . 2023.07.19 19:20:11 - Using WinTun network interface "eddie (Wintun Userspace Tunnel)" ! 2023.07.19 19:20:11 - Connecting to Kajam (Netherlands, Alblasserdam) . 2023.07.19 19:20:11 - Routes, add 213.152.161.87/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)". . 2023.07.19 19:20:11 - Routes, add 213.152.161.87/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)", already exists. . 2023.07.19 19:20:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.19 19:20:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.19 19:20:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.19 19:20:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.19 19:20:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.19 19:20:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.19 19:20:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.19 19:20:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2023.07.19 19:20:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.19 19:20:12 - OpenVPN > UDP link local: (not bound) . 2023.07.19 19:20:12 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443 . 2023.07.19 19:20:43 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.07.19 19:20:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.07.19 19:20:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2023.07.19 19:20:49 - Disconnecting . 2023.07.19 19:20:49 - Routes, delete 213.152.161.87/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)". . 2023.07.19 19:20:50 - Routes, delete 213.152.161.87/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)", not exists. . 2023.07.19 19:20:50 - Connection terminated. I 2023.07.19 19:20:53 - Checking authorization ... . 2023.07.19 19:20:53 - Using WinTun network interface "eddie (Wintun Userspace Tunnel)" ! 2023.07.19 19:20:53 - Connecting to Situla (Netherlands, Alblasserdam) . 2023.07.19 19:20:53 - Routes, add 213.152.161.17/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)". . 2023.07.19 19:20:53 - Routes, add 213.152.161.17/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)", already exists. . 2023.07.19 19:20:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.19 19:20:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.19 19:20:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.19 19:20:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.19 19:20:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.19 19:20:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.19 19:20:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.19 19:20:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.17:443 . 2023.07.19 19:20:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.19 19:20:53 - OpenVPN > UDP link local: (not bound) . 2023.07.19 19:20:53 - OpenVPN > UDP link remote: [AF_INET]213.152.161.17:443 ! 2023.07.19 19:20:58 - Disconnecting . 2023.07.19 19:20:58 - Sending soft termination signal . 2023.07.19 19:21:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.07.19 19:21:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.07.19 19:21:03 - Routes, delete 213.152.161.17/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)". . 2023.07.19 19:21:03 - Routes, delete 213.152.161.17/32 for interface "Radmin VPN (Famatech Radmin VPN Ethernet Adapter)", not exists. . 2023.07.19 19:21:03 - Connection terminated. I 2023.07.19 19:21:03 - Cancel requested. ! 2023.07.19 19:21:03 - Session terminated.
-
Hi, I have been using airvpn with Eddie and LInux for some years now, and have never experienced the current problem: My system is KDE Neon 5.27. I tried Eddie 2.21.8 (the latest stable version) and also the older one, 2.21.6 The symptoms are the same. I configured automatic network lock after startup of Eddie, but tried disabling network lock and then connecting, which didn't change anything, either. The thing is, when I click on "connect to a recommended server", it keeps doing the latency tests and always hangs when it is around 30 or so remaining. Then nothing happens anymore. So to connect, I have to select an individual server, and here the connection works just find, pretty fast. But even so, the connection gets lost after some time (maybe half an hour to an hour) and then it won't reconnect anymore. I am not sure if this is related or absolutely normal behaviour, as I usually always do "connect to a recommended server", and in that case automatically reconnects, anyway. But my feeling is that in the past, I would often stay on the same server for hours without a problem, so I have this hunch that this relatively early losing of the connection is not expected behaviour. I had the same KDE Neon setup with Eddie on an older computer and used it until a few days ago without a problem. Then I switched to the new box. Of course, the system is slightly different because of some updates it received, but there is not much of a difference, which is why I am surprised that I am having these problems right now. Any ideas?
-
Dear AirVPN Administrators, [I have consulted the pinned sub-topic] I have a very frustrating problem that has recently arisen, for the first time, since I started with AirVPN, in connecting to my domains hosted by DreamHost, in that I cannot connect to them. The server in question: breakside.dreamhost.com (75.119.200.120) This is an example of a domain that I cannot connect to: https://mt-meru.space https://airvpn.org/routes/?q=mt-meru.space Whilst the results look good from that route check, none the less, on my machine that domain remains inaccessible. On my machine, I've flushed the DNS, and checked the Hosts file, and Firewall, for any possible issues - all to no avail. I can successfully connect to all of my domains hosted on the Breakside Server, once AirVPN is no longer being used. I have also initiated a support ticket with DreamHost technical support. The networking technicalities of what might be going on, are well beyond my paygrade. Any assistance most gratefully apprised. Thank you for your attention.
-
IPv6 IS NOW WORKING AGAIN. 1. Does anyone have an IPv6 address with Lich? I can get one normally with other servers but not Lich. I've messaged support, they said (on December 11 or earlier) that the datacenter had one business day to reply to them about the problem and they confirmed issues with it. But they seem to be ignoring my responses. So do you have IPv6 with this server? 2. Why does IPLeak.com say the long, lat is 0 , 0? I mentioned that in the above mentioned support ticket and it was completely ignored. Dnsleaktest.com says unknown as the location and not United States or something.
- ...
- 5 replies
-
- lich
- problem
- server
- location
- ipleak
- dnsleaktest
- no support response
- no ipv6
-
(and 7 more)
Tagged with:
-
Hello! I thought it was time to try and collect some of the wisdom floating around and see if we can't create a single thread for solving some of the most common and annoying repeat-issues. So how about it ! I define "common problems" as: if I'm getting a deja-vu every third time I post . Staff will have broken the Matrix by this point. Each problem will have its own headline and then with any number of solution-oriented links appended underneath. For this reason, this grand list isn't final and is meant to be updated continually. Naturally, the higher the link number for a solution, the more obscure the solutions are probably getting. Warning: solutions aren't guaranteed. As with anything technical, trial and error is a core skill Problem: Bootstrap Failed.Solutions:https://airvpn.org/topic/30824-bootstrap-failed-since-a-week/Problem: No Internet connection after shutting down AirVPN and/or can only use Internet while AirVPN is on.Solutions:https://airvpn.org/topic/14829-can-only-connect-to-the-internet-browser-through-airvpn/?do=findComment&comment=30509 Windows only: https://airvpn.org/topic/13584-connection-problem-when-not-using-airvpn/?p=38800 MacOS only: https://airvpn.org/topic/27993-cant-connect-to-internet-without-using-airvpn/ https://airvpn.org/topic/21194-virtualbox-is-this-air-vpn-also-cant-connect-internet-unless-signed-in/Problem: Cannot connect to any AirVPN server.Solutions:https://airvpn.org/topic/22140-cannot-connect-to-german-servers-anymore/ https://airvpn.org/topic/22066-cant-seem-to-connect-to-any-servers/ https://airvpn.org/topic/21418-new-to-airvpn-installed-avpn-on-surface-wwindows-10-cannot-connect-at-school-can-connect-fine-at-most-other-locations/?p=55515Problem: Issues with Curl.Solutions:https://airvpn.org/topic/27369-cannot-login-curl-is-required/Problem: Bad packet ID (may be a replay)Solutions:https://airvpn.org/topic/14094-weird-log-entries/Problem: Being censored and/or speeds being throttled/shaped by ISP or Government.Solutions:https://airvpn.org/topic/28847-connections-from-china/ Problem: MacOS client can't connect.Solutions:https://airvpn.org/topic/18251-airvpn-mac-client-problems/ Problem: Checking route IPv6 Failed.Solutions:https://airvpn.org/topic/29401-checking-route-ipv6-failed-cannot-connect-to-vpn-server-using-eddie/ Problem: Waiting for TUN/TAP to come up.Solutions:https://airvpn.org/topic/26072-route-gateway-is-not-reachable-on-any-active-network-adapters-10401/?do=findComment&comment=70761 Windows only: https://airvpn.org/topic/17440-guide-fix-for-tap-adapter-in-windows/ Windows only: https://airvpn.org/topic/30043-taptun-interface-wont-come-up/ Problem: Experiencing slow and/or fluctuating speeds in general.Solutions:https://airvpn.org/topic/30739-every-vpn-is-slow-for-me-despite-the-well-reviewed-vpns-im-trying-is-it-possible-my-isp-is-causing-this-i-feel-like-someones-playing-a-joke-on-me/?p=80014 https://airvpn.org/topic/18635-looking-for-fast-server-eu-that-goes-beyond-30-40mbit/?p=44998 For online gaming: https://airvpn.org/topic/30135-frequent-spikes-lag-on-videogames/?p=79046 https://airvpn.org/topic/1947-for-those-wondering-about-speed-performance/?p=1967 https://airvpn.org/topic/26157-airvpn-slowing-down-other-machines-in-network/ https://airvpn.org/topic/26117-slow-speed-sort-of/?p=70906 https://airvpn.org/topic/20812-very-very-slow-dns-lookup/ https://airvpn.org/topic/23743-download-speeds-dropping-to-zero-and-going-up-and-down/ Problem: Slow torrent speeds and/or disconnects.Solutions:https://airvpn.org/topic/28082-torrent-on-airvpn-speed-is-very-poor/ https://airvpn.org/topic/26218-slow-torrent-speeds/ https://airvpn.org/topic/23936-repeatedly-getting-disconnects-while-torrenting/ https://airvpn.org/topic/23499-slow-torrenting-speed/ https://airvpn.org/topic/23070-solved-p2p-slow-over-udp-and-fast-over-tcp/ https://airvpn.org/topic/22716-poor-torrenting-connection/Solutions are in link form without any explanatory text - at least not yet - so that the thread OP stays looking simple and uncluttered, where it's easy to find out what your problem is . Feel free to contribute with your own helpful links. The more feedback this thread gets, the quicker it can be improved and hopefully made useful.
-
I recently purchased AirVPN and wanted to use it on my Imac that has windows bootcamped on it (that might have something to do with it). I keep trying to connect to a server, but it constantly just restarts and doesn't work properly. I have found other threads with the same problem, but none oftheir solutions worked for me. These are my logs I hope any of you can be of service. Thank You. I 2018.01.14 11:09:17 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.01.14 11:09:18 - Reading options from C:\Users\Aaron Lozhkin\AppData\Local\AirVPN\AirVPN.xml. 2018.01.14 11:09:18 - Command line arguments (1): path="home"I 2018.01.14 11:09:22 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.01.14 11:09:22 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.01.14 11:09:22 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.01.14 11:09:22 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.01.14 11:09:22 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.01.14 11:09:22 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.01.14 11:09:23 - Updating systems & servers data ...! 2018.01.14 11:09:23 - Ready. 2018.01.14 11:09:24 - Systems & servers data update completedI 2018.01.14 11:09:38 - Checking login ...! 2018.01.14 11:09:39 - Logged in.I 2018.01.14 11:09:42 - Session starting.. 2018.01.14 11:09:43 - IPv6 disabled with packet filtering.I 2018.01.14 11:09:47 - Checking authorization ...! 2018.01.14 11:09:48 - Connecting to Cephei (Canada, Toronto, Ontario). 2018.01.14 11:09:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:48 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:48 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:48 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:48 - OpenVPN > UDP link remote: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=4b733229 f2c60aa0. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:48 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:48 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443. 2018.01.14 11:09:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.117.254 255.255.0.0'. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:50 - Disconnecting. 2018.01.14 11:09:50 - Connection terminated.I 2018.01.14 11:09:53 - Checking authorization ...! 2018.01.14 11:09:54 - Connecting to Regulus (Canada, Toronto, Ontario). 2018.01.14 11:09:54 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:54 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:54 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:54 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:54 - OpenVPN > UDP link remote: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=d1979e04 9eab1da8. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:54 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:54 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:54 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443. 2018.01.14 11:09:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.160 255.255.0.0'. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:56 - Disconnecting. 2018.01.14 11:09:56 - Connection terminated.I 2018.01.14 11:09:59 - Checking authorization ...! 2018.01.14 11:10:03 - Connecting to Mintaka (Canada, Toronto, Ontario). 2018.01.14 11:10:03 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:03 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:03 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:03 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:03 - OpenVPN > UDP link remote: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.218:443, sid=373e21ff 395332df. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:03 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:03 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.218:443. 2018.01.14 11:10:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:10:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.33.169 255.255.0.0'. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:10:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:10:04 - Disconnecting. 2018.01.14 11:10:04 - Connection terminated.I 2018.01.14 11:10:07 - Checking authorization ...! 2018.01.14 11:10:08 - Connecting to Tegmen (Canada, Toronto, Ontario). 2018.01.14 11:10:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:08 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:08 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:08 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:10 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=f11e385e b86412f6. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:10 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:10 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:10 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443! 2018.01.14 11:10:11 - Disconnecting. 2018.01.14 11:10:11 - Connection terminated.I 2018.01.14 11:10:14 - Checking authorization ...! 2018.01.14 11:10:15 - Connecting to Tyl (Canada, Toronto, Ontario). 2018.01.14 11:10:15 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:15 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:15 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:15 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:15 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:15 - OpenVPN > UDP link remote: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.202:443, sid=d6e8c2f8 49cc15b3. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:15 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:15 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.202:443. 2018.01.14 11:10:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)! 2018.01.14 11:10:17 - Disconnecting. 2018.01.14 11:10:17 - Connection terminated.I 2018.01.14 11:10:20 - Checking authorization .... 2018.01.14 11:10:29 - Above log line repeated 2 times moreI 2018.01.14 11:10:29 - Cancel requested.. 2018.01.14 11:10:29 - IPv6 restored with packet filtering.! 2018.01.14 11:10:29 - Session terminated.
-
Hello, now i get my new connection and with it i get ipv6 only. There is a ds-lite tunnel for ipv4 things but it won't work with the AirVPN client. I always get the following: The machine runs with Xubuntu 16.10 64bit. You will find my logfile in the Attachment. I can't use AirVPN now. :-( What can i do? Cheers AirVPN_20161202_090120.txt
-
Unable to use AirVPN on heavily firewalled wifi
R8T3D posted a topic in Troubleshooting and Problems
Hello! I have been using AirVPN at home like a charm for months now, however when I am on a certain network away from my house I cannot seem to get it to work. When I use all of the non-SSL and SSH protocols, it fails to connect. When I use SSL or SSH I get an error in my logs: "Squid does not support some access protocols. For example, the SSH protocol is currently not supported." How can I fix this so I can use SSL or SSH? -
Here is my log file. I can't make sense of it why keeps disconnecting I changed the VERB to 4 Sep 10 12:05:07 openvpn 6958 MANAGEMENT: CMD 'status 2' Sep 10 12:05:07 openvpn 6958 MANAGEMENT: Client disconnected Sep 10 12:05:17 openvpn 6958 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock Sep 10 12:05:17 openvpn 6958 MANAGEMENT: CMD 'state 1' Sep 10 12:05:17 openvpn 6958 MANAGEMENT: CMD 'status 2' Sep 10 12:05:17 openvpn 6958 MANAGEMENT: Client disconnected Sep 10 12:05:27 openvpn 6958 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock Sep 10 12:05:27 openvpn 6958 MANAGEMENT: CMD 'state 1' Sep 10 12:05:27 openvpn 6958 MANAGEMENT: CMD 'status 2' Sep 10 12:05:27 openvpn 6958 MANAGEMENT: Client disconnected Sep 10 12:05:36 openvpn 6958 event_wait : Interrupted system call (code=4) Sep 10 12:05:36 openvpn 6958 SIGTERM received, sending exit notification to peer Sep 10 12:05:37 openvpn 6958 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock Sep 10 12:05:37 openvpn 6958 MANAGEMENT: CMD 'state 1' Sep 10 12:05:37 openvpn 6958 MANAGEMENT: CMD 'status 2' Sep 10 12:05:37 openvpn 6958 MANAGEMENT: Client disconnected Sep 10 12:05:40 openvpn 36512 Current Parameter Settings: Sep 10 12:05:40 openvpn 36512 config = '/var/etc/openvpn/client1.conf' Sep 10 12:05:40 openvpn 36512 mode = 0 Sep 10 12:05:40 openvpn 36512 show_ciphers = DISABLED Sep 10 12:05:40 openvpn 36512 show_digests = DISABLED Sep 10 12:05:40 openvpn 36512 show_engines = DISABLED Sep 10 12:05:40 openvpn 36512 genkey = DISABLED Sep 10 12:05:40 openvpn 36512 key_pass_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 show_tls_ciphers = DISABLED Sep 10 12:05:40 openvpn 36512 Connection profiles [default]: Sep 10 12:05:40 openvpn 36512 proto = udp Sep 10 12:05:40 openvpn 36512 local = '67.173.152.223' Sep 10 12:05:40 openvpn 36512 local_port = 0 Sep 10 12:05:40 openvpn 36512 remote = '173.234.159.194' Sep 10 12:05:40 openvpn 36512 remote_port = 443 Sep 10 12:05:40 openvpn 36512 remote_float = DISABLED Sep 10 12:05:40 openvpn 36512 bind_defined = DISABLED Sep 10 12:05:40 openvpn 36512 bind_local = ENABLED Sep 10 12:05:40 openvpn 36512 connect_retry_seconds = 5 Sep 10 12:05:40 openvpn 36512 connect_timeout = 10 Sep 10 12:05:40 openvpn 36512 connect_retry_max = 0 Sep 10 12:05:40 openvpn 36512 socks_proxy_server = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 socks_proxy_port = 0 Sep 10 12:05:40 openvpn 36512 socks_proxy_retry = DISABLED Sep 10 12:05:40 openvpn 36512 tun_mtu = 1500 Sep 10 12:05:40 openvpn 36512 tun_mtu_defined = ENABLED Sep 10 12:05:40 openvpn 36512 link_mtu = 1500 Sep 10 12:05:40 openvpn 36512 link_mtu_defined = DISABLED Sep 10 12:05:40 openvpn 36512 tun_mtu_extra = 0 Sep 10 12:05:40 openvpn 36512 tun_mtu_extra_defined = DISABLED Sep 10 12:05:40 openvpn 36512 mtu_discover_type = -1 Sep 10 12:05:40 openvpn 36512 fragment = 0 Sep 10 12:05:40 openvpn 36512 mssfix = 1450 Sep 10 12:05:40 openvpn 36512 explicit_exit_notification = 5 Sep 10 12:05:40 openvpn 36512 Connection profiles END Sep 10 12:05:40 openvpn 36512 remote_random = DISABLED Sep 10 12:05:40 openvpn 36512 ipchange = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 dev = 'ovpnc1' Sep 10 12:05:40 openvpn 36512 dev_type = 'tun' Sep 10 12:05:40 openvpn 36512 dev_node = '/dev/tun1' Sep 10 12:05:40 openvpn 36512 lladdr = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 topology = 1 Sep 10 12:05:40 openvpn 36512 tun_ipv6 = DISABLED Sep 10 12:05:40 openvpn 36512 ifconfig_local = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ifconfig_remote_netmask = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ifconfig_noexec = DISABLED Sep 10 12:05:40 openvpn 36512 ifconfig_nowarn = DISABLED Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_local = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_netbits = 0 Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_remote = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 shaper = 0 Sep 10 12:05:40 openvpn 36512 mtu_test = 0 Sep 10 12:05:40 openvpn 36512 mlock = ENABLED Sep 10 12:05:40 openvpn 36512 keepalive_ping = 10 Sep 10 12:05:40 openvpn 36512 keepalive_timeout = 60 Sep 10 12:05:40 openvpn 36512 inactivity_timeout = 0 Sep 10 12:05:40 openvpn 36512 ping_send_timeout = 10 Sep 10 12:05:40 openvpn 36512 ping_rec_timeout = 60 Sep 10 12:05:40 openvpn 36512 ping_rec_timeout_action = 2 Sep 10 12:05:40 openvpn 36512 ping_timer_remote = ENABLED Sep 10 12:05:40 openvpn 36512 remap_sigusr1 = 0 Sep 10 12:05:40 openvpn 36512 persist_tun = ENABLED Sep 10 12:05:40 openvpn 36512 persist_local_ip = DISABLED Sep 10 12:05:40 openvpn 36512 persist_remote_ip = DISABLED Sep 10 12:05:40 openvpn 36512 persist_key = ENABLED Sep 10 12:05:40 openvpn 36512 passtos = DISABLED Sep 10 12:05:40 openvpn 36512 resolve_retry_seconds = 1000000000 Sep 10 12:05:40 openvpn 36512 username = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 groupname = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 chroot_dir = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 cd_dir = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 writepid = '/var/run/openvpn_client1.pid' Sep 10 12:05:40 openvpn 36512 up_script = '/usr/local/sbin/ovpn-linkup' Sep 10 12:05:40 openvpn 36512 down_script = '/usr/local/sbin/ovpn-linkdown' Sep 10 12:05:40 openvpn 36512 down_pre = DISABLED Sep 10 12:05:40 openvpn 36512 up_restart = DISABLED Sep 10 12:05:40 openvpn 36512 up_delay = DISABLED Sep 10 12:05:40 openvpn 36512 daemon = ENABLED Sep 10 12:05:40 openvpn 36512 inetd = 0 Sep 10 12:05:40 openvpn 36512 log = DISABLED Sep 10 12:05:40 openvpn 36512 suppress_timestamps = DISABLED Sep 10 12:05:40 openvpn 36512 nice = 0 Sep 10 12:05:40 openvpn 36512 verbosity = 4 Sep 10 12:05:40 openvpn 36512 mute = 0 Sep 10 12:05:40 openvpn 36512 gremlin = 0 Sep 10 12:05:40 openvpn 36512 status_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 status_file_version = 1 Sep 10 12:05:40 openvpn 36512 status_file_update_freq = 60 Sep 10 12:05:40 openvpn 36512 occ = ENABLED Sep 10 12:05:40 openvpn 36512 rcvbuf = 0 Sep 10 12:05:40 openvpn 36512 sndbuf = 0 Sep 10 12:05:40 openvpn 36512 sockflags = 0 Sep 10 12:05:40 openvpn 36512 fast_io = ENABLED Sep 10 12:05:40 openvpn 36512 lzo = 1 Sep 10 12:05:40 openvpn 36512 route_script = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 route_default_gateway = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 route_default_metric = 0 Sep 10 12:05:40 openvpn 36512 route_noexec = DISABLED Sep 10 12:05:40 openvpn 36512 route_delay = 0 Sep 10 12:05:40 openvpn 36512 route_delay_window = 30 Sep 10 12:05:40 openvpn 36512 route_delay_defined = DISABLED Sep 10 12:05:40 openvpn 36512 route_nopull = ENABLED Sep 10 12:05:40 openvpn 36512 route_gateway_via_dhcp = DISABLED Sep 10 12:05:40 openvpn 36512 max_routes = 100 Sep 10 12:05:40 openvpn 36512 allow_pull_fqdn = DISABLED Sep 10 12:05:40 openvpn 36512 management_addr = '/var/etc/openvpn/client1.sock' Sep 10 12:05:40 openvpn 36512 management_port = 0 Sep 10 12:05:40 openvpn 36512 management_user_pass = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 management_log_history_cache = 250 Sep 10 12:05:40 openvpn 36512 management_echo_buffer_size = 100 Sep 10 12:05:40 openvpn 36512 management_write_peer_info_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 management_client_user = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 management_client_group = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 management_flags = 256 Sep 10 12:05:40 openvpn 36512 shared_secret_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 key_direction = 2 Sep 10 12:05:40 openvpn 36512 ciphername_defined = ENABLED Sep 10 12:05:40 openvpn 36512 ciphername = 'AES-256-CBC' Sep 10 12:05:40 openvpn 36512 authname_defined = ENABLED Sep 10 12:05:40 openvpn 36512 authname = 'SHA1' Sep 10 12:05:40 openvpn 36512 prng_hash = 'SHA512' Sep 10 12:05:40 openvpn 36512 prng_nonce_secret_len = 64 Sep 10 12:05:40 openvpn 36512 keysize = 32 Sep 10 12:05:40 openvpn 36512 engine = ENABLED Sep 10 12:05:40 openvpn 36512 replay = ENABLED Sep 10 12:05:40 openvpn 36512 mute_replay_warnings = DISABLED Sep 10 12:05:40 openvpn 36512 replay_window = 64 Sep 10 12:05:40 openvpn 36512 replay_time = 15 Sep 10 12:05:40 openvpn 36512 packet_id_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 use_iv = ENABLED Sep 10 12:05:40 openvpn 36512 test_crypto = DISABLED Sep 10 12:05:40 openvpn 36512 tls_server = DISABLED Sep 10 12:05:40 openvpn 36512 tls_client = ENABLED Sep 10 12:05:40 openvpn 36512 key_method = 2 Sep 10 12:05:40 openvpn 36512 ca_file = '/var/etc/openvpn/client1.ca' Sep 10 12:05:40 openvpn 36512 ca_path = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 dh_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 cert_file = '/var/etc/openvpn/client1.cert' Sep 10 12:05:40 openvpn 36512 extra_certs_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 priv_key_file = '/var/etc/openvpn/client1.key' Sep 10 12:05:40 openvpn 36512 pkcs12_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 cipher_list = 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384' Sep 10 12:05:40 openvpn 36512 tls_verify = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 tls_export_cert = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 verify_x509_type = 0 Sep 10 12:05:40 openvpn 36512 verify_x509_name = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 crl_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ns_cert_type = 1 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 160 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 136 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_ku[i] = 0 Sep 10 12:05:40 openvpn 36512 remote_cert_eku = 'TLS Web Server Authentication' Sep 10 12:05:40 openvpn 36512 ssl_flags = 192 Sep 10 12:05:40 openvpn 36512 tls_timeout = 2 Sep 10 12:05:40 openvpn 36512 renegotiate_bytes = -1 Sep 10 12:05:40 openvpn 36512 renegotiate_packets = 0 Sep 10 12:05:40 openvpn 36512 renegotiate_seconds = 3600 Sep 10 12:05:40 openvpn 36512 handshake_window = 60 Sep 10 12:05:40 openvpn 36512 transition_window = 3600 Sep 10 12:05:40 openvpn 36512 single_session = DISABLED Sep 10 12:05:40 openvpn 36512 push_peer_info = DISABLED Sep 10 12:05:40 openvpn 36512 tls_exit = DISABLED Sep 10 12:05:40 openvpn 36512 tls_auth_file = '/var/etc/openvpn/client1.tls-auth' Sep 10 12:05:40 openvpn 36512 server_network = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 server_netmask = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 server_network_ipv6 = :: Sep 10 12:05:40 openvpn 36512 server_netbits_ipv6 = 0 Sep 10 12:05:40 openvpn 36512 server_bridge_ip = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 server_bridge_netmask = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 server_bridge_pool_start = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 server_bridge_pool_end = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 ifconfig_pool_defined = DISABLED Sep 10 12:05:40 openvpn 36512 ifconfig_pool_start = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 ifconfig_pool_end = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 ifconfig_pool_netmask = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 ifconfig_pool_persist_filename = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ifconfig_pool_persist_refresh_freq = 600 Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_pool_defined = DISABLED Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_pool_base = :: Sep 10 12:05:40 openvpn 36512 ifconfig_ipv6_pool_netbits = 0 Sep 10 12:05:40 openvpn 36512 n_bcast_buf = 256 Sep 10 12:05:40 openvpn 36512 tcp_queue_limit = 64 Sep 10 12:05:40 openvpn 36512 real_hash_size = 256 Sep 10 12:05:40 openvpn 36512 virtual_hash_size = 256 Sep 10 12:05:40 openvpn 36512 client_connect_script = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 learn_address_script = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 client_disconnect_script = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 client_config_dir = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 ccd_exclusive = DISABLED Sep 10 12:05:40 openvpn 36512 tmp_dir = '/tmp' Sep 10 12:05:40 openvpn 36512 push_ifconfig_defined = DISABLED Sep 10 12:05:40 openvpn 36512 push_ifconfig_local = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 push_ifconfig_remote_netmask = 0.0.0.0 Sep 10 12:05:40 openvpn 36512 push_ifconfig_ipv6_defined = DISABLED Sep 10 12:05:40 openvpn 36512 push_ifconfig_ipv6_local = ::/0 Sep 10 12:05:40 openvpn 36512 push_ifconfig_ipv6_remote = :: Sep 10 12:05:40 openvpn 36512 enable_c2c = DISABLED Sep 10 12:05:40 openvpn 36512 duplicate_cn = DISABLED Sep 10 12:05:40 openvpn 36512 cf_max = 0 Sep 10 12:05:40 openvpn 36512 cf_per = 0 Sep 10 12:05:40 openvpn 36512 max_clients = 1024 Sep 10 12:05:40 openvpn 36512 max_routes_per_client = 256 Sep 10 12:05:40 openvpn 36512 auth_user_pass_verify_script = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 auth_user_pass_verify_script_via_file = DISABLED Sep 10 12:05:40 openvpn 36512 port_share_host = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 port_share_port = 0 Sep 10 12:05:40 openvpn 36512 client = ENABLED Sep 10 12:05:40 openvpn 36512 pull = ENABLED Sep 10 12:05:40 openvpn 36512 auth_user_pass_file = '[UNDEF]' Sep 10 12:05:40 openvpn 36512 OpenVPN 2.3.14 amd64-portbld-freebsd10.3 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on May 3 2017 Sep 10 12:05:40 openvpn 36512 library versions: OpenSSL 1.0.1s-freebsd 1 Mar 2016, LZO 2.10 Sep 10 12:05:40 openvpn 36593 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sock Sep 10 12:05:40 openvpn 36593 mlockall call succeeded Sep 10 12:05:40 openvpn 36593 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sep 10 12:05:40 openvpn 36593 Initializing OpenSSL support for engine 'cryptodev' Sep 10 12:05:40 openvpn 36593 Control Channel Authentication: using '/var/etc/openvpn/client1.tls-auth' as a OpenVPN static key file Sep 10 12:05:40 openvpn 36593 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 10 12:05:40 openvpn 36593 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 10 12:05:40 openvpn 36593 LZO compression initialized Sep 10 12:05:40 openvpn 36593 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ] Sep 10 12:05:40 openvpn 36593 Socket Buffers: R=[42080->42080] S=[57344->57344] Sep 10 12:05:40 openvpn 36593 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:143 ET:0 EL:3 AF:3/1 ] Sep 10 12:05:40 openvpn 36593 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client' Sep 10 12:05:40 openvpn 36593 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server' Sep 10 12:05:40 openvpn 36593 Local Options hash (VER=V4): '9e7066d2' Sep 10 12:05:40 openvpn 36593 Expected Remote Options hash (VER=V4): '162b04de' Sep 10 12:05:40 openvpn 36593 UDPv4 link local (bound): [AF_INET]67.173.152.223 Sep 10 12:05:40 openvpn 36593 UDPv4 link remote: [AF_INET]173.234.159.194:443 Sep 10 12:05:40 openvpn 36593 TLS: Initial packet from [AF_INET]173.234.159.194:443, sid=50645ec5 49590908 Sep 10 12:05:40 openvpn 36593 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Sep 10 12:05:40 openvpn 36593 VERIFY OK: nsCertType=SERVER Sep 10 12:05:40 openvpn 36593 Validating certificate key usage Sep 10 12:05:40 openvpn 36593 ++ Certificate has key usage 00a0, expects 00a0 Sep 10 12:05:40 openvpn 36593 VERIFY KU OK Sep 10 12:05:40 openvpn 36593 Validating certificate extended key usage Sep 10 12:05:40 openvpn 36593 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sep 10 12:05:40 openvpn 36593 VERIFY EKU OK Sep 10 12:05:40 openvpn 36593 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Miaplacidus, emailAddress=info@airvpn.org Sep 10 12:05:40 openvpn 36593 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sep 10 12:05:40 openvpn 36593 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 10 12:05:40 openvpn 36593 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sep 10 12:05:40 openvpn 36593 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 10 12:05:40 openvpn 36593 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Sep 10 12:05:40 openvpn 36593 [Miaplacidus] Peer Connection Initiated with [AF_INET]173.234.159.194:443 Sep 10 12:05:42 openvpn 36593 SENT CONTROL [Miaplacidus]: 'PUSH_REQUEST' (status=1) Sep 10 12:05:42 openvpn 36593 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.126 255.255.0.0,peer-id 68' Sep 10 12:05:42 openvpn 36593 Options error: option 'redirect-gateway' cannot be used in this context ([PUSH-OPTIONS]) Sep 10 12:05:42 openvpn 36593 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS]) Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: timers and/or timeouts modified Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: LZO parms modified Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: --ifconfig/up options modified Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: route-related options modified Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: peer-id set Sep 10 12:05:42 openvpn 36593 OPTIONS IMPORT: adjusting link_mtu to 1561 Sep 10 12:05:42 openvpn 36593 TUN/TAP device ovpnc1 exists previously, keep at program end Sep 10 12:05:42 openvpn 36593 TUN/TAP device /dev/tun1 opened Sep 10 12:05:42 openvpn 36593 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Sep 10 12:05:42 openvpn 36593 /sbin/ifconfig ovpnc1 10.4.6.126 10.4.0.1 mtu 1500 netmask 255.255.0.0 up Sep 10 12:05:42 openvpn 36593 /sbin/route add -net 10.4.0.0 10.4.0.1 255.255.0.0 Sep 10 12:05:42 openvpn 36593 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1561 10.4.6.126 255.255.0.0 init Sep 10 12:05:42 openvpn 36593 Initialization Sequence Completed
-
I'm having an issue where every time I open qBittorrent, AirVPN stays connected for about a minute then gets stuck disconnecting until I force close the program with the task manager. When I open AirVPN and try to connect to a server I get a message saying OpenVPN is already running. When I try to force close OpenVPN Daemon with the task manager it does nothing, forcing me to reboot. I can't seem to find any information about why the Eddie-GUI gets stuck on the 'disconnecting' screen or why opening qBittorrent disconnects the vpn. Any advice is appreciated.
-
The title. Bought it yesterday. It works on all other devices except the Computer I bought it on. Help pls
-
hello everyone Can someone tell me what I did wrong. I setup pfSense on VM with airvpn suddenly all my hosts behind the firewall cannot access the internet I checked the firewall log and I found that my firewall is blocking the traffic The rule that triggered this action is: @114(1465196278) block return in log quick on em1 inet from 192.168.1.0/24 to <PRIVATE_NETWORKS:3> label "USER_RULE: REJECT LOCAL" thank you EDIT: Host can ping the pfsense but pfsense cannot ping any host on this subnet 192.168.1.0/24
-
I haven't got internet connection from my real IP when I disconnect in the client. When I connect to a VPN server, everything is fine, just sometimes I have DNS errors in the browser for seconds when I'm browsing. I've been struggling with this issue about a week. I didn't change anything before the problem occured. I updated the client software now, but everything is the same. I don't know what to do. I would like to set up everything to default, but I don't know what was changed in the settings by the client. I don't want to reinstall the Windows 7, probably this would solve the problem, but if the client changed some settings, maybe it could occur again when I reinstall it. Sometimes I use the internet without VPN, so I need to solve it. Can you help me with this?
-
Two different topics in the same post since I can only make a single post a day. Sorry. First, what is the proper way to set the.ovpn configuration file in order to enable VPN through Tor? I have attempted using 127.0.0.1 as the SOCKS proxy but that has not worked. Maybe it has something to do with the control port? Second, I have been able to get Eddie started on CentOS 7, but for some reason, Eddie does not connect to any server. I used all default settings once, and then disabled DNS check. Posting relevant log below: I 2016.09.30 12:22:37 - Session starting. I 2016.09.30 12:22:38 - Checking authorization ... ! 2016.09.30 12:22:38 - Connecting to Gemma (Canada, Vancouver) . 2016.09.30 12:22:38 - OpenVPN > OpenVPN 2.3.12 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Aug 23 2016 . 2016.09.30 12:22:38 - OpenVPN > library versions: OpenSSL 1.0.1e-fips 11 Feb 2013, LZO 2.06 . 2016.09.30 12:22:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 12:22:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 12:22:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link remote: [AF_INET]##.##.###.###:443 . 2016.09.30 12:23:10 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2016.09.30 12:23:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 12:23:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2016.09.30 12:23:15 - Disconnecting . 2016.09.30 12:23:15 - Connection terminated. I 2016.09.30 12:23:16 - Cancel requested. ! 2016.09.30 12:23:16 - Session terminated. If any advancements have been made in either issues, I would greatly appreciate any news - even if it's bad news.
-
ANSWERED Can't connect to many servers (NL, SE...)
Baum posted a topic in Troubleshooting and Problems
Hello, For some reason I can't connect to the Netherlands servers or Sweden servers in AirVPN for Windows. They are showen as the fastest, but I can't connect to them. One Austrian works for me, but has a lower ping. Are the servers down, or is there a problem with my client? -
Hello. Just today I paid for the subscription again and couldn't connect to any server at all. Everything goes as usual until the moment of "checking route". After some time the connection automatically terminates and tries to restart itself but fails. Here are the logs: I 2016.04.09 00:42:22 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.09 00:42:23 - Reading options from C:\Users\1\AppData\Local\AirVPN\AirVPN.xml . 2016.04.09 00:42:24 - Data Path: C:\Users\1\AppData\Local\AirVPN . 2016.04.09 00:42:24 - App Path: C:\Program Files\AirVPN . 2016.04.09 00:42:24 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.09 00:42:24 - Command line arguments (1): path="home" . 2016.04.09 00:42:24 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.09 00:42:24 - Updating systems & servers data ... . 2016.04.09 00:42:27 - Systems & servers data update completed I 2016.04.09 00:42:28 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.04.09 00:42:28 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.09 00:42:28 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.09 00:42:28 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) W 2016.04.09 00:42:28 - Recovery. Unexpected crash? I 2016.04.09 00:42:30 - IPv6 restored. ! 2016.04.09 00:42:30 - Ready I 2016.04.09 00:42:53 - Session starting. I 2016.04.09 00:42:53 - IPv6 disabled. I 2016.04.09 00:42:53 - Checking authorization ... ! 2016.04.09 00:42:54 - Connecting to Zaniah (Sweden, Uppsala) . 2016.04.09 00:42:54 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.09 00:42:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.09 00:42:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.09 00:42:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.09 00:42:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.09 00:42:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.09 00:42:54 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.09 00:42:54 - OpenVPN > UDPv4 link local: [undef] . 2016.04.09 00:42:54 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443 . 2016.04.09 00:42:54 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=d53a47d3 d0429d43 . 2016.04.09 00:42:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.09 00:42:54 - OpenVPN > Validating certificate key usage . 2016.04.09 00:42:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.09 00:42:54 - OpenVPN > VERIFY KU OK . 2016.04.09 00:42:54 - OpenVPN > Validating certificate extended key usage . 2016.04.09 00:42:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.09 00:42:54 - OpenVPN > VERIFY EKU OK . 2016.04.09 00:42:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.09 00:42:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.09 00:42:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.09 00:42:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.09 00:42:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.09 00:42:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.09 00:42:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443 . 2016.04.09 00:42:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.09 00:42:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.45.31 255.255.0.0' . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.09 00:42:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.09 00:42:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.09 00:42:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.09 00:42:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{FBD38E39-B071-495B-B439-F0491BA3F2CA}.tap . 2016.04.09 00:42:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.09 00:42:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.45.31/255.255.0.0 [sUCCEEDED] . 2016.04.09 00:42:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.31/255.255.0.0 on interface {FBD38E39-B071-495B-B439-F0491BA3F2CA} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.09 00:42:57 - OpenVPN > Successful ARP Flush on interface [25] {FBD38E39-B071-495B-B439-F0491BA3F2CA} . 2016.04.09 00:43:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.09 00:43:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.09 00:43:03 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.09 00:43:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.09 00:43:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.136 MASK 255.255.255.255 192.168.1.1 . 2016.04.09 00:43:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.04.09 00:43:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.09 00:43:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 17 . 2016.04.09 00:43:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.04.09 00:43:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.09 00:43:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.09 00:43:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.09 00:43:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.09 00:43:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.09 00:43:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.09 00:43:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.09 00:43:07 - Starting Management Interface . 2016.04.09 00:43:07 - OpenVPN > Initialization Sequence Completed I 2016.04.09 00:43:07 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 1000) I 2016.04.09 00:43:08 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.09 00:43:08 - Flushing DNS I 2016.04.09 00:43:08 - Checking route W 2016.04.09 00:43:58 - Время ожидания операции истекло ! 2016.04.09 00:43:58 - Disconnecting . 2016.04.09 00:43:58 - Management - Send 'signal SIGTERM' . 2016.04.09 00:43:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.09 00:43:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.09 00:43:58 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.09 00:44:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.136 MASK 255.255.255.255 192.168.1.1 . 2016.04.09 00:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.09 00:44:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1 . 2016.04.09 00:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.09 00:44:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.09 00:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.09 00:44:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.09 00:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.09 00:44:03 - OpenVPN > Closing TUN/TAP interface . 2016.04.09 00:44:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.09 00:44:03 - Connection terminated. I 2016.04.09 00:44:03 - DNS of a network adapter restored to original settings (Intel® Centrino® Wireless-N 1000) I 2016.04.09 00:44:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.09 00:44:05 - Cancel requested. I 2016.04.09 00:44:05 - IPv6 restored. ! 2016.04.09 00:44:05 - Session terminated. Hope you can help me.(Windows 10) P.S. Yes, I tried to remove the "Check if the tunnel effectively works". Didn't help at all.
-
Hello! Recently I have been enjoying AirVPN, while having a 25Mbps Download/25Mbps Upload Fiber connection with Verizon FiOS. I was getting relatively good speeds, usually around 22 or 23 Mbps while connected to AirVPN, which was very good. However, this changed when, on Tuesday, I upgraded my internet speed from 25 Download/25 Upload to 50 Download/50 Upload. My speeds while not connected to AirVPN significantly increased. However, my speeds when connected to AirVPN only rose by 1 to 2 Mbps. I would like to find out why there is such a big difference between my speed while connected to AirVPN and my speed while not connected to AirVPN. I don't think this is the fault of any of the Air servers I am using, as they all support 1Gbps. I have included some speedtest.net results below, if it helps. Internet Speed while not connected to AirVPN Internet Speed while connected to AirVPN (UDP 443) (for this test, I was using Zosma, but other servers that I tried yielded similar results) I have also included the Eddie client's logs, if they are needed I 2016.04.07 16:08:54 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.07 16:08:54 - Reading options from C:\Program Files\AirVPN\AirVPN.xml . 2016.04.07 16:09:01 - Data Path: C:\Program Files\AirVPN . 2016.04.07 16:09:01 - App Path: C:\Program Files\AirVPN . 2016.04.07 16:09:01 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.07 16:09:01 - Command line arguments (0): . 2016.04.07 16:09:01 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.07 16:09:01 - Updating systems & servers data ... . 2016.04.07 16:09:03 - Systems & servers data update completed I 2016.04.07 16:09:03 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2 I 2016.04.07 16:09:03 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.07 16:09:03 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.07 16:09:03 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) W 2016.04.07 16:09:04 - Recovery. Unexpected crash? ! 2016.04.07 16:09:04 - Deactivation of Network Lock ! 2016.04.07 16:09:10 - Activation of Network Lock - Windows Firewall ! 2016.04.07 16:11:07 - Ready I 2016.04.07 16:20:57 - Session starting. I 2016.04.07 16:20:58 - IPv6 disabled. I 2016.04.07 16:20:59 - Checking authorization ... ! 2016.04.07 16:20:59 - Connecting to Rasalas (United States, Newark, New Jersey) . 2016.04.07 16:21:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.07 16:21:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.07 16:21:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.07 16:21:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.07 16:21:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:21:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:21:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.04.07 16:21:01 - OpenVPN > UDPv4 link local: [undef] . 2016.04.07 16:21:01 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443 . 2016.04.07 16:21:01 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=16b9c059 06d689a9 . 2016.04.07 16:21:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 16:21:01 - OpenVPN > Validating certificate key usage . 2016.04.07 16:21:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 16:21:01 - OpenVPN > VERIFY KU OK . 2016.04.07 16:21:01 - OpenVPN > Validating certificate extended key usage . 2016.04.07 16:21:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 16:21:01 - OpenVPN > VERIFY EKU OK . 2016.04.07 16:21:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 16:21:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:21:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:21:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:21:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:21:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 16:21:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443 . 2016.04.07 16:21:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.07 16:21:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.28 255.255.0.0' . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.07 16:21:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.07 16:21:08 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.07 16:21:09 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap . 2016.04.07 16:21:09 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.04.07 16:21:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.28/255.255.0.0 [sUCCEEDED] . 2016.04.07 16:21:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.28/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.07 16:21:09 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E} . 2016.04.07 16:21:14 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.07 16:21:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.07 16:21:14 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.07 16:21:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:21:20 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.04.07 16:21:20 - OpenVPN > Route addition fallback to route.exe . 2016.04.07 16:21:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:21:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:21:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:21:20 - Starting Management Interface . 2016.04.07 16:21:20 - OpenVPN > Initialization Sequence Completed I 2016.04.07 16:21:20 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.07 16:21:20 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.04.07 16:21:20 - Flushing DNS I 2016.04.07 16:21:21 - Checking route I 2016.04.07 16:21:33 - Checking DNS ! 2016.04.07 16:21:35 - Connected. . 2016.04.07 16:21:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.04.07 16:21:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2016.04.07 16:29:56 - Disconnecting . 2016.04.07 16:29:56 - Management - Send 'signal SIGTERM' . 2016.04.07 16:29:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.07 16:29:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:30:01 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.04.07 16:30:01 - OpenVPN > Route deletion fallback to route.exe . 2016.04.07 16:30:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:30:01 - OpenVPN > Closing TUN/TAP interface . 2016.04.07 16:30:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.07 16:30:01 - Connection terminated. I 2016.04.07 16:30:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.07 16:30:02 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller) I 2016.04.07 16:30:05 - Checking authorization ... ! 2016.04.07 16:30:05 - Connecting to Alhena (Canada, Toronto, Ontario) . 2016.04.07 16:30:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.07 16:30:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.07 16:30:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.07 16:30:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.07 16:30:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:30:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:30:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.04.07 16:30:06 - OpenVPN > UDPv4 link local: [undef] . 2016.04.07 16:30:06 - OpenVPN > UDPv4 link remote: [AF_INET]162.219.176.2:443 . 2016.04.07 16:30:06 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=abd7407d 2173389b . 2016.04.07 16:30:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 16:30:06 - OpenVPN > Validating certificate key usage . 2016.04.07 16:30:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 16:30:06 - OpenVPN > VERIFY KU OK . 2016.04.07 16:30:06 - OpenVPN > Validating certificate extended key usage . 2016.04.07 16:30:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 16:30:06 - OpenVPN > VERIFY EKU OK . 2016.04.07 16:30:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 16:30:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:30:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:30:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:30:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:30:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 16:30:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443 . 2016.04.07 16:30:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.07 16:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.189 255.255.0.0' . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.07 16:30:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.07 16:30:11 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.07 16:30:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap . 2016.04.07 16:30:12 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.04.07 16:30:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.189/255.255.0.0 [sUCCEEDED] . 2016.04.07 16:30:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.189/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.07 16:30:12 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E} . 2016.04.07 16:30:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.07 16:30:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.07 16:30:17 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.07 16:30:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 162.219.176.2 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:30:21 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.04.07 16:30:21 - OpenVPN > Route addition fallback to route.exe . 2016.04.07 16:30:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:30:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:30:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:30:21 - Starting Management Interface . 2016.04.07 16:30:21 - OpenVPN > Initialization Sequence Completed I 2016.04.07 16:30:21 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.07 16:30:21 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.04.07 16:30:21 - Flushing DNS I 2016.04.07 16:30:21 - Checking route I 2016.04.07 16:30:47 - Checking DNS ! 2016.04.07 16:30:48 - Connected. . 2016.04.07 16:30:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.04.07 16:30:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2016.04.07 16:38:18 - Disconnecting . 2016.04.07 16:38:18 - Management - Send 'signal SIGTERM' . 2016.04.07 16:38:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.07 16:38:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 162.219.176.2 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:38:23 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.04.07 16:38:23 - OpenVPN > Route deletion fallback to route.exe . 2016.04.07 16:38:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:38:23 - OpenVPN > Closing TUN/TAP interface . 2016.04.07 16:38:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.07 16:38:23 - Connection terminated. I 2016.04.07 16:38:23 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.07 16:38:24 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller) I 2016.04.07 16:38:27 - Checking authorization ... ! 2016.04.07 16:38:27 - Connecting to Zosma (United States, New York City) . 2016.04.07 16:38:27 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.07 16:38:27 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.07 16:38:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.07 16:38:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.07 16:38:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:38:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:38:27 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.04.07 16:38:27 - OpenVPN > UDPv4 link local: [undef] . 2016.04.07 16:38:27 - OpenVPN > UDPv4 link remote: [AF_INET]23.105.129.218:443 . 2016.04.07 16:38:27 - OpenVPN > TLS: Initial packet from [AF_INET]23.105.129.218:443, sid=c7b765be 8c0305df . 2016.04.07 16:38:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 16:38:28 - OpenVPN > Validating certificate key usage . 2016.04.07 16:38:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 16:38:28 - OpenVPN > VERIFY KU OK . 2016.04.07 16:38:28 - OpenVPN > Validating certificate extended key usage . 2016.04.07 16:38:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 16:38:28 - OpenVPN > VERIFY EKU OK . 2016.04.07 16:38:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 16:38:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:38:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:38:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:38:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:38:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 16:38:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.105.129.218:443 . 2016.04.07 16:38:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.07 16:38:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.209 255.255.0.0' . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.07 16:38:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.07 16:38:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.07 16:38:36 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap . 2016.04.07 16:38:36 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.04.07 16:38:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.209/255.255.0.0 [sUCCEEDED] . 2016.04.07 16:38:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.209/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.07 16:38:36 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E} . 2016.04.07 16:38:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.07 16:38:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.07 16:38:41 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.07 16:38:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 23.105.129.218 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:38:46 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.04.07 16:38:46 - OpenVPN > Route addition fallback to route.exe . 2016.04.07 16:38:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:38:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:38:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:38:46 - Starting Management Interface . 2016.04.07 16:38:46 - OpenVPN > Initialization Sequence Completed I 2016.04.07 16:38:46 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.07 16:38:46 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.04.07 16:38:46 - Flushing DNS I 2016.04.07 16:38:46 - Checking route I 2016.04.07 16:39:10 - Checking DNS ! 2016.04.07 16:39:11 - Connected. . 2016.04.07 16:39:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.07 16:39:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.04.07 16:39:20 - Updating systems & servers data ... . 2016.04.07 16:39:21 - Systems & servers data update completed ! 2016.04.07 16:44:42 - Disconnecting . 2016.04.07 16:44:42 - Management - Send 'signal SIGTERM' . 2016.04.07 16:44:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.07 16:44:42 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 23.105.129.218 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:44:47 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.04.07 16:44:47 - OpenVPN > Route deletion fallback to route.exe . 2016.04.07 16:44:47 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 16:44:47 - OpenVPN > Closing TUN/TAP interface . 2016.04.07 16:44:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.07 16:44:47 - Connection terminated. I 2016.04.07 16:44:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.07 16:44:48 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller) I 2016.04.07 16:44:51 - Checking authorization ... ! 2016.04.07 16:44:51 - Connecting to Miaplacidus (United States, Newark, New Jersey) . 2016.04.07 16:44:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.07 16:44:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.07 16:44:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.07 16:44:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.07 16:44:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:44:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:44:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.04.07 16:44:52 - OpenVPN > UDPv4 link local: [undef] . 2016.04.07 16:44:52 - OpenVPN > UDPv4 link remote: [AF_INET]173.234.159.194:443 . 2016.04.07 16:44:52 - OpenVPN > TLS: Initial packet from [AF_INET]173.234.159.194:443, sid=cfa05f68 314bda29 . 2016.04.07 16:44:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 16:44:52 - OpenVPN > Validating certificate key usage . 2016.04.07 16:44:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 16:44:52 - OpenVPN > VERIFY KU OK . 2016.04.07 16:44:52 - OpenVPN > Validating certificate extended key usage . 2016.04.07 16:44:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 16:44:52 - OpenVPN > VERIFY EKU OK . 2016.04.07 16:44:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 16:44:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:44:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:44:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 16:44:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 16:44:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 16:44:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.234.159.194:443 . 2016.04.07 16:44:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.07 16:44:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.20 255.255.0.0' . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.07 16:44:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.07 16:44:54 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.07 16:44:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap . 2016.04.07 16:44:55 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.04.07 16:44:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.20/255.255.0.0 [sUCCEEDED] . 2016.04.07 16:44:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.20/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.07 16:44:55 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E} . 2016.04.07 16:45:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.07 16:45:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.07 16:45:00 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.07 16:45:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.234.159.194 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 16:45:05 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.04.07 16:45:05 - OpenVPN > Route addition fallback to route.exe . 2016.04.07 16:45:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:45:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 16:45:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 16:45:05 - Starting Management Interface . 2016.04.07 16:45:05 - OpenVPN > Initialization Sequence Completed I 2016.04.07 16:45:05 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.07 16:45:05 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.04.07 16:45:05 - Flushing DNS I 2016.04.07 16:45:05 - Checking route I 2016.04.07 16:45:28 - Checking DNS ! 2016.04.07 16:45:29 - Connected. . 2016.04.07 16:45:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.04.07 16:45:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.07 17:09:32 - Updating systems & servers data ... . 2016.04.07 17:09:33 - Systems & servers data update completed . 2016.04.07 17:40:20 - Updating systems & servers data ... . 2016.04.07 17:40:21 - Systems & servers data update completed . 2016.04.07 17:44:52 - OpenVPN > TLS: soft reset sec=0 bytes=688570945/0 pkts=798085/0 . 2016.04.07 17:44:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 17:44:52 - OpenVPN > Validating certificate key usage . 2016.04.07 17:44:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 17:44:52 - OpenVPN > VERIFY KU OK . 2016.04.07 17:44:52 - OpenVPN > Validating certificate extended key usage . 2016.04.07 17:44:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 17:44:52 - OpenVPN > VERIFY EKU OK . 2016.04.07 17:44:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 17:44:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 17:44:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 17:44:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 17:44:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 17:44:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 18:10:29 - Updating systems & servers data ... . 2016.04.07 18:10:31 - Systems & servers data update completed ! 2016.04.07 18:20:03 - Disconnecting . 2016.04.07 18:20:03 - Management - Send 'signal SIGTERM' . 2016.04.07 18:20:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.07 18:20:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.234.159.194 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 18:20:08 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.04.07 18:20:08 - OpenVPN > Route deletion fallback to route.exe . 2016.04.07 18:20:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.07 18:20:08 - OpenVPN > Closing TUN/TAP interface . 2016.04.07 18:20:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.07 18:20:12 - Connection terminated. I 2016.04.07 18:20:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.07 18:20:19 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller) I 2016.04.07 18:20:19 - IPv6 restored. ! 2016.04.07 18:20:20 - Session terminated. I 2016.04.07 18:31:43 - Session starting. I 2016.04.07 18:31:44 - IPv6 disabled. I 2016.04.07 18:31:44 - Checking authorization ... ! 2016.04.07 18:31:44 - Connecting to Zosma (United States, New York City) . 2016.04.07 18:31:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.04.07 18:31:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.07 18:31:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.07 18:31:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.07 18:31:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 18:31:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 18:31:45 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072] . 2016.04.07 18:31:45 - OpenVPN > UDPv4 link local: [undef] . 2016.04.07 18:31:45 - OpenVPN > UDPv4 link remote: [AF_INET]23.105.129.218:443 . 2016.04.07 18:31:45 - OpenVPN > TLS: Initial packet from [AF_INET]23.105.129.218:443, sid=39564e90 95441f76 . 2016.04.07 18:31:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.07 18:31:46 - OpenVPN > Validating certificate key usage . 2016.04.07 18:31:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.07 18:31:46 - OpenVPN > VERIFY KU OK . 2016.04.07 18:31:46 - OpenVPN > Validating certificate extended key usage . 2016.04.07 18:31:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.07 18:31:46 - OpenVPN > VERIFY EKU OK . 2016.04.07 18:31:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.07 18:31:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 18:31:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 18:31:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.07 18:31:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.07 18:31:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.07 18:31:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.105.129.218:443 . 2016.04.07 18:31:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.07 18:31:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.209 255.255.0.0' . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.07 18:31:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.07 18:31:58 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.07 18:31:58 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap . 2016.04.07 18:31:58 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.04.07 18:31:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.209/255.255.0.0 [sUCCEEDED] . 2016.04.07 18:31:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.209/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.07 18:31:58 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E} . 2016.04.07 18:32:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.04.07 18:32:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.04.07 18:32:03 - AirVPN Windows Interface Hack executed (Ethernet 2) . 2016.04.07 18:32:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 23.105.129.218 MASK 255.255.255.255 10.10.10.1 . 2016.04.07 18:32:08 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches) . 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2016.04.07 18:32:08 - OpenVPN > Route addition fallback to route.exe . 2016.04.07 18:32:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 18:32:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.07 18:32:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.07 18:32:08 - Starting Management Interface . 2016.04.07 18:32:08 - OpenVPN > Initialization Sequence Completed I 2016.04.07 18:32:08 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.07 18:32:08 - DNS of a network adapter forced (Realtek PCIe FE Family Controller) I 2016.04.07 18:32:09 - Flushing DNS I 2016.04.07 18:32:09 - Checking route I 2016.04.07 18:32:44 - Checking DNS ! 2016.04.07 18:32:45 - Connected. . 2016.04.07 18:32:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.04.07 18:32:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.07 18:40:59 - Updating systems & servers data ... . 2016.04.07 18:41:01 - Systems & servers data update completed
-
Hi everyone, I have million of questions and also looking for step by step guide. im running mac os x. I run Tor Bundle 1st, then start airvpn client in tor mode (pref->protocol->tor) and when i check my ip in Tor browser and firefox (all stock settings) i have 2 different stories: in Tor browser i have Tor exit node ip in firefox i have my exit vpn ip 1) so what is really happening? 2) does firefox go tor then to vpn? 3) how to check tor "stage" if it even happens(or i have to socks proxy localhost??) 4) why does tor browser "bypasses vpn"? 5) how to set everything go smooth? 6) is it possible to work is tor browser? Additional 6) how to avoid "VPN fingerprint" and "double ping" warnings when checking anonymity (i've read that ssl or ssh protocols should be used....but then i'm not able to use Tor?(i'm not able to choose 2 protocols at the same time in GUI) or how to add socks 5 proxy to the chain as an exit node while still using Tor as a 1 stage) Looking for your replies if you have a link to a "noob" manual, I would greatly appreciate it!!! (I wonder why there are no standard airvpn manual on how to do it step-by-step)
-
Hello, I can be online only with airvpn, if I'm not connected to airvpn I can't connect my pc to internet. I've windows 10, and I never used Network Lock. Thanks for help and sorry for my english.