Search the Community
Showing results for tags 'Troubleshoot'.
Found 7 results
-
trouble connecting ANSWERED Unable to connect
MasterExploder posted a topic in Troubleshooting and Problems
I've been using Eddie sporadically for a while now. Recently, I've been unable to connect, though. Eddie will attempt to connect to a server, before timing out and retrying with another server. This will repeat. I'm not sure how to fix. Here are my most recent logs: https://eddie.website/report/b804e8d7/ -
I can''t connect to any of the servers. Here are my logs: . 2023.08.05 02:51:38 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2023.08.05 02:51:38 - Command line arguments (1): path="home" . 2023.08.05 02:51:39 - Reading options from C:\Users\María Antonieta\AppData\Local\Eddie\default.profile . 2023.08.05 02:51:41 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.08.05 02:51:41 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.08.05 02:51:41 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.08.05 02:51:42 - Ready . 2023.08.05 02:51:42 - Collect information about AirVPN completed I 2023.08.05 02:51:50 - Session starting. I 2023.08.05 02:51:51 - Checking authorization ... . 2023.08.05 02:51:51 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.08.05 02:51:52 - Connecting to Aspidiske (Netherlands, Alblasserdam) . 2023.08.05 02:51:52 - Routes, add 134.19.179.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2023.08.05 02:51:52 - Routes, add 134.19.179.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2023.08.05 02:51:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.08.05 02:51:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.08.05 02:51:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.08.05 02:51:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.08.05 02:51:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.08.05 02:51:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.08.05 02:51:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.08.05 02:51:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.08.05 02:51:52 - OpenVPN > UDP link local: (not bound) . 2023.08.05 02:51:52 - OpenVPN > UDP link remote: [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:52 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.197:443, sid=95d29327 50668003 . 2023.08.05 02:51:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.08.05 02:51:53 - OpenVPN > VERIFY KU OK . 2023.08.05 02:51:53 - OpenVPN > Validating certificate extended key usage . 2023.08.05 02:51:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.08.05 02:51:53 - OpenVPN > VERIFY EKU OK . 2023.08.05 02:51:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aspidiske, emailAddress=info@airvpn.org . 2023.08.05 02:51:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.08.05 02:51:53 - OpenVPN > [Aspidiske] Peer Connection Initiated with [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.134.1,dhcp-option DNS6 fde6:7a:7d20:1d86::1,tun-ipv6,route-gateway 10.33.134.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d86::10c6/64 fde6:7a:7d20:1d86::1,ifconfig 10.33.134.200 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.134.1' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d86::1' . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.08.05 02:51:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.08.05 02:51:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.08.05 02:51:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.08.05 02:51:53 - OpenVPN > interactive service msg_channel=0 . 2023.08.05 02:51:53 - OpenVPN > open_tun . 2023.08.05 02:51:53 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.08.05 02:51:53 - OpenVPN > Exiting due to fatal error ! 2023.08.05 02:51:53 - Disconnecting Anyone got any idea what's preventing me from connecting?
-
Hi, I'm struggling to browse for the files needed to setup openvpn on my Samsung galaxy a12. The files have been downloaded and these are visible within the file browser but when I look for them in the openvpn app no files at all are visible. This is also the case when I used an SD card. I've gone into the settings option of the phone and allowed the openvpn app to view/edit files. Can anyone help me resolve this? Thanks
-
ANSWERED Help with SoulSeek and forward porting
nubdubnub posted a topic in Troubleshooting and Problems
Hi everyone, I purchased AirVPN recently to use it with a p2p file sharing application SoulSeek. I'm very new to this stuff and really in need of some guidance. I was able to add my 2 ports in the "client area" section of the AirVPN website. Then I ran a TCP test check and recieved the message, "Not reachable on server IP over the external port #####, tcp protocol. Error 110 - connection timed out". I'm not into torrenting, I just want to use this VPN for Soulseek. I haven't done anything to my router since I'm not comfortable messing with the settings on it. Also when I check the ports on SoulSeek it also says the ports are closed. Any guidance is most welcomed! -Nub -
Hello, I just ordered a subscription but was unable to connect to any server using the eddie-ui software (that i installed from the deb repo) under linux Mint Tara . I've found some related topic (about some trouble under mint) but since my OpenVPN package is already under 2.4.4 it seem's not relevant. So i'm not able to connect to any server and it's looping in connect, disconnect cycle. Here is the Repport : Eddie System/Environment Report - 25/11/2018 10:49 UTC Eddie version: 2.16.3 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Mint 19 Tara \n \l OS version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) SSL: stunnel 5.44 (/usr/bin/stunnel4) curl: 7.58.0 (/usr/bin/curl) Profile path: /home/usname/.airvpn/default.xml Data path: /home/usname/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: No Connected to VPN: No Detected DNS: 127.0.0.53 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: -1 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Ok . 2018.11.25 11:44:01 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Linux Mint 19 Tara \n \l, Version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2018.11.25 11:44:01 - Reading options from /home/usname/.airvpn/default.xml . 2018.11.25 11:44:02 - Command line arguments (5): path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2018.11.25 11:44:02 - Profile path: /home/usname/.airvpn/default.xml . 2018.11.25 11:44:03 - OpenVPN Driver - Found, /dev/net/tun . 2018.11.25 11:44:03 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2018.11.25 11:44:03 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2018.11.25 11:44:03 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2018.11.25 11:44:03 - curl - Version: 7.58.0 (/usr/bin/curl) . 2018.11.25 11:44:03 - Certification Authorities: /usr/share/eddie-ui/cacert.pem . 2018.11.25 11:44:03 - Updating systems & servers data ... I 2018.11.25 11:44:03 - Ready . 2018.11.25 11:44:04 - Systems & servers data update completed I 2018.11.25 11:45:06 - Session starting. I 2018.11.25 11:45:06 - Checking authorization ... ! 2018.11.25 11:45:06 - Connecting to Alderamin (Austria, Vienna) . 2018.11.25 11:45:06 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2018.11.25 11:45:06 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2018.11.25 11:45:06 - Connection to OpenVPN Management Interface . 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:06 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.11.25 11:45:06 - OpenVPN > UDP link local: (not bound) . 2018.11.25 11:45:06 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:38 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2018.11.25 11:45:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.11.25 11:45:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.11.25 11:45:44 - Disconnecting . 2018.11.25 11:45:44 - Connection terminated. I 2018.11.25 11:45:47 - Checking authorization ... ! 2018.11.25 11:45:47 - Connecting to Alderamin (Austria, Vienna) . 2018.11.25 11:45:47 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2018.11.25 11:45:47 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2018.11.25 11:45:47 - Connection to OpenVPN Management Interface . 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:47 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.11.25 11:45:47 - OpenVPN > UDP link local: (not bound) . 2018.11.25 11:45:47 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.11.25 11:46:19 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2018.11.25 11:46:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.11.25 11:46:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.11.25 11:46:25 - Disconnecting . 2018.11.25 11:46:25 - Connection terminated. I 2018.11.25 11:46:28 - Checking authorization ... ! 2018.11.25 11:46:28 - Connecting to Alderamin (Austria, Vienna) [... keep looping] Thanks for help.
-
I recently purchased AirVPN and wanted to use it on my Imac that has windows bootcamped on it (that might have something to do with it). I keep trying to connect to a server, but it constantly just restarts and doesn't work properly. I have found other threads with the same problem, but none oftheir solutions worked for me. These are my logs I hope any of you can be of service. Thank You. I 2018.01.14 11:09:17 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.01.14 11:09:18 - Reading options from C:\Users\Aaron Lozhkin\AppData\Local\AirVPN\AirVPN.xml. 2018.01.14 11:09:18 - Command line arguments (1): path="home"I 2018.01.14 11:09:22 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.01.14 11:09:22 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.01.14 11:09:22 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.01.14 11:09:22 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.01.14 11:09:22 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.01.14 11:09:22 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.01.14 11:09:23 - Updating systems & servers data ...! 2018.01.14 11:09:23 - Ready. 2018.01.14 11:09:24 - Systems & servers data update completedI 2018.01.14 11:09:38 - Checking login ...! 2018.01.14 11:09:39 - Logged in.I 2018.01.14 11:09:42 - Session starting.. 2018.01.14 11:09:43 - IPv6 disabled with packet filtering.I 2018.01.14 11:09:47 - Checking authorization ...! 2018.01.14 11:09:48 - Connecting to Cephei (Canada, Toronto, Ontario). 2018.01.14 11:09:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:48 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:48 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:48 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:48 - OpenVPN > UDP link remote: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=4b733229 f2c60aa0. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:48 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:48 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443. 2018.01.14 11:09:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.117.254 255.255.0.0'. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:50 - Disconnecting. 2018.01.14 11:09:50 - Connection terminated.I 2018.01.14 11:09:53 - Checking authorization ...! 2018.01.14 11:09:54 - Connecting to Regulus (Canada, Toronto, Ontario). 2018.01.14 11:09:54 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:54 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:54 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:54 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:54 - OpenVPN > UDP link remote: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=d1979e04 9eab1da8. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:54 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:54 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:54 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443. 2018.01.14 11:09:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.160 255.255.0.0'. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:56 - Disconnecting. 2018.01.14 11:09:56 - Connection terminated.I 2018.01.14 11:09:59 - Checking authorization ...! 2018.01.14 11:10:03 - Connecting to Mintaka (Canada, Toronto, Ontario). 2018.01.14 11:10:03 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:03 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:03 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:03 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:03 - OpenVPN > UDP link remote: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.218:443, sid=373e21ff 395332df. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:03 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:03 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.218:443. 2018.01.14 11:10:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:10:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.33.169 255.255.0.0'. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:10:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:10:04 - Disconnecting. 2018.01.14 11:10:04 - Connection terminated.I 2018.01.14 11:10:07 - Checking authorization ...! 2018.01.14 11:10:08 - Connecting to Tegmen (Canada, Toronto, Ontario). 2018.01.14 11:10:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:08 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:08 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:08 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:10 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=f11e385e b86412f6. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:10 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:10 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:10 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443! 2018.01.14 11:10:11 - Disconnecting. 2018.01.14 11:10:11 - Connection terminated.I 2018.01.14 11:10:14 - Checking authorization ...! 2018.01.14 11:10:15 - Connecting to Tyl (Canada, Toronto, Ontario). 2018.01.14 11:10:15 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:15 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:15 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:15 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:15 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:15 - OpenVPN > UDP link remote: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.202:443, sid=d6e8c2f8 49cc15b3. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:15 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:15 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.202:443. 2018.01.14 11:10:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)! 2018.01.14 11:10:17 - Disconnecting. 2018.01.14 11:10:17 - Connection terminated.I 2018.01.14 11:10:20 - Checking authorization .... 2018.01.14 11:10:29 - Above log line repeated 2 times moreI 2018.01.14 11:10:29 - Cancel requested.. 2018.01.14 11:10:29 - IPv6 restored with packet filtering.! 2018.01.14 11:10:29 - Session terminated.