Jump to content
Not connected, Your IP: 18.226.166.214

Search the Community

Showing results for tags 'Update'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 10 results

  1. So, yesterday night I logged in on airvpn to check the remaining time of my subscription and I randomly navigated through the forums to see what's new. And to my surprise I found that Eddie is on 2.14.4 version, while the version I was using was 2.10. And this has troubled me ever since. Is there a reason why there isn't an autoupdate/check for updates feature on Eddie? To my knowledge, even the most basic/indie/FOSS programs have a "check for update" option implemented. I would like to know the reasoning behind this. Thank you!
  2. I've used the dynamic DNS service for a very long time and all of a sudden the DNS entry doesn't get updated anymore. What I have tried: Wait for 3 hours to make sure that the TTL has been reached: Check ✔Check the TCP Port via the ✔Check my client if the connection worked: Works ✔Try to connect via the IP under "Mapped to public IP:": Works ✔Connect to the server via the airdns.org domain name: Fail ✘Resolve the AirDNS IP: Fail ✘Issue: The IP address is wrong and hasn't been updated yet
  3. Hi I installed ubuntu 17.10. Eddie does not work anymore with the new Wayland display server. I have to change on Xorg. An Eddie client update is required to work with the new Wayland display server. The Xorg option is temporary because Ubuntu (canonical) has definitlety adopted Wayland since 17.10 Regards.
  4. I’ve been using AirVPN for a long time, I don’t plan on leaving anytime soon either. Just a quick question really, why doesn’t AirVPN software (Eddie) have an update notification? Each time a newer version comes out I have to stumble upon it from either the forums or by checking the latest version on the download page. Is there a reason? Is it already implemented but I’m just not seeing it? If it’s not yet been implemented, are there any plans to implement it. Just a little notification that informs you of a newer version.
  5. I just figured out that we are already on AirVPN UI 2.12.13, and I was running 2.9.2. Is there any way we can have an update notification check? For example, a pop-up on the UI saying, "hey, there's an update to your software!" I can't believe I missed so many versions and have been dealing with the same version (and its issues) for so long.
  6. Just installed the most recent Windows 10 update, been looking around the site but haven't found a definitive solution. I keep disconnecting as it is checking the route, I've tried unchecking "Check if the tunnel uses AirVPN DNS", but that results in a faulty connection. Logs: I 2016.12.06 23:38:00 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.12.06 23:38:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.12.06 23:38:00 - Data Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - App Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.12.06 23:38:00 - Command line arguments (0):. 2016.12.06 23:38:00 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.12.06 23:38:00 - Updating systems & servers data ...I 2016.12.06 23:38:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.12.06 23:38:00 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.12.06 23:38:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.12.06 23:38:00 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.12.06 23:38:00 - Ready. 2016.12.06 23:38:01 - Systems & servers data update completedI 2016.12.06 23:38:02 - Session starting.I 2016.12.06 23:38:02 - IPv6 disabled.I 2016.12.06 23:38:08 - Checking authorization ...! 2016.12.06 23:38:09 - Connecting to Cursa (United States, Miami). 2016.12.06 23:38:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:38:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:38:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:38:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:38:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link remote: [AF_INET]96.47.229.58:443. 2016.12.06 23:38:09 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.58:443, sid=66b5f82a a1377c50. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:38:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:38:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:38:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:38:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.58:443. 2016.12.06 23:38:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:38:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.21 255.255.0.0'. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:38:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:38:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:38:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:38:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:38:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.21/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:38:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.21/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:38:11 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:38:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - Starting Management Interface. 2016.12.06 23:38:16 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:38:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:38:16 - Flushing DNSI 2016.12.06 23:38:16 - Checking routeW 2016.12.06 23:38:40 - The remote name could not be resolved: 'cursa_exit.airservers.org'! 2016.12.06 23:38:40 - Disconnecting. 2016.12.06 23:38:40 - Management - Send 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:38:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:38:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:38:45 - Connection terminated.I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:38:48 - Cancel requested.I 2016.12.06 23:38:48 - IPv6 restored.! 2016.12.06 23:38:48 - Session terminated.I 2016.12.06 23:43:24 - Session starting.I 2016.12.06 23:43:24 - IPv6 disabled.I 2016.12.06 23:43:25 - Checking authorization ...! 2016.12.06 23:43:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:43:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:43:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:43:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:43:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:43:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:43:25 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=6c854023 923066a3. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Validating certificate key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:43:25 - OpenVPN > VERIFY KU OK. 2016.12.06 23:43:25 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:43:25 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:43:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:43:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:43:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:43:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:43:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:43:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:43:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:43:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:43:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:43:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:43:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - Starting Management Interface. 2016.12.06 23:43:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:43:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:43:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:43:33 - Flushing DNSI 2016.12.06 23:43:33 - Checking DNSW 2016.12.06 23:43:57 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:43:57 - Disconnecting. 2016.12.06 23:43:57 - Management - Send 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:43:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:44:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:44:02 - Connection terminated.I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:44:05 - Cancel requested.I 2016.12.06 23:44:05 - IPv6 restored.! 2016.12.06 23:44:05 - Session terminated.I 2016.12.06 23:50:11 - Session starting.I 2016.12.06 23:50:11 - IPv6 disabled.I 2016.12.06 23:50:11 - Checking authorization ...! 2016.12.06 23:50:11 - Connecting to Acamar (United States, Miami). 2016.12.06 23:50:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:50:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:50:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:50:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:50:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:50:11 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=b96b8d3e 113c910e. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:50:11 - OpenVPN > Validating certificate key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:50:11 - OpenVPN > VERIFY KU OK. 2016.12.06 23:50:11 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:50:11 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:50:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:50:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:50:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:50:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:50:14 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:50:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:50:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:50:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:50:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:50:14 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:50:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - Starting Management Interface. 2016.12.06 23:50:19 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:50:19 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:50:19 - Flushing DNSI 2016.12.06 23:50:19 - Checking DNSW 2016.12.06 23:50:43 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:50:44 - Disconnecting. 2016.12.06 23:50:44 - Management - Send 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:50:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:50:49 - Connection terminated.I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:50:49 - Cancel requested.I 2016.12.06 23:50:49 - IPv6 restored.! 2016.12.06 23:50:49 - Session terminated.I 2016.12.06 23:52:25 - Session starting.I 2016.12.06 23:52:25 - IPv6 disabled.I 2016.12.06 23:52:25 - Checking authorization ...! 2016.12.06 23:52:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:52:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:52:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:52:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=061a5617 c2c9cd1f. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Validating certificate key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:52:26 - OpenVPN > VERIFY KU OK. 2016.12.06 23:52:26 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:52:26 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:52:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:52:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:52:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:52:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:52:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:52:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - Starting Management Interface. 2016.12.06 23:52:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:52:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:52:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:52:33 - Flushing DNS! 2016.12.06 23:52:33 - Connected.. 2016.12.06 23:52:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:53:30 - Disconnecting. 2016.12.06 23:53:30 - Management - Send 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:53:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:53:35 - Connection terminated.I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:53:35 - IPv6 restored.! 2016.12.06 23:53:35 - Session terminated.I 2016.12.06 23:57:04 - Session starting.I 2016.12.06 23:57:04 - IPv6 disabled.I 2016.12.06 23:57:04 - Checking authorization ...! 2016.12.06 23:57:04 - Connecting to Acamar (United States, Miami). 2016.12.06 23:57:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:57:04 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=3144bc70 76c93ca4. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:05 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:05 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:05 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:57:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:07 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - Starting Management Interface. 2016.12.06 23:57:12 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:12 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:12 - Flushing DNS! 2016.12.06 23:57:12 - Connected.. 2016.12.06 23:57:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:57:36 - Disconnecting. 2016.12.06 23:57:36 - Management - Send 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:57:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:57:41 - Connection terminated.I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:57:44 - Checking authorization ...! 2016.12.06 23:57:44 - Connecting to Yildun (United States, Miami). 2016.12.06 23:57:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443. 2016.12.06 23:57:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2c89d04c abcce70e. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443. 2016.12.06 23:57:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.64 255.255.0.0'. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.64/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.64/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - Starting Management Interface. 2016.12.06 23:57:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:52 - Flushing DNS! 2016.12.06 23:57:52 - Connected.. 2016.12.06 23:57:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:58:03 - Disconnecting. 2016.12.06 23:58:03 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:08 - Connection terminated.I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:08 - IPv6 restored.! 2016.12.06 23:58:08 - Session terminated.I 2016.12.06 23:58:09 - Session starting.I 2016.12.06 23:58:09 - IPv6 disabled.I 2016.12.06 23:58:09 - Checking authorization ...! 2016.12.06 23:58:09 - Connecting to Acamar (United States, Miami). 2016.12.06 23:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=8e90e690 ea17a30b. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:58:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:58:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:58:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:58:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:58:12 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:58:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:58:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:58:12 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:58:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - Starting Management Interface. 2016.12.06 23:58:17 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:58:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:58:17 - Flushing DNS! 2016.12.06 23:58:17 - Connected.. 2016.12.06 23:58:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2016.12.06 23:58:32 - Disconnecting. 2016.12.06 23:58:32 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:37 - Connection terminated.I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:37 - IPv6 restored.! 2016.12.06 23:58:37 - Session terminated.I 2016.12.06 23:59:43 - Session starting.I 2016.12.06 23:59:43 - IPv6 disabled.I 2016.12.06 23:59:43 - Checking authorization ...! 2016.12.06 23:59:44 - Connecting to Acamar (United States, Miami). 2016.12.06 23:59:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:59:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:59:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:59:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:59:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=cdf0a51f fc693d36. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:59:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:59:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:59:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:59:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:59:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:59:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:59:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:59:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:59:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:59:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:59:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:59:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:59:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:59:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - Starting Management Interface. 2016.12.06 23:59:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:59:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:59:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:59:52 - Flushing DNS! 2016.12.06 23:59:52 - Connected.. 2016.12.06 23:59:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.07 00:00:12 - Disconnecting. 2016.12.07 00:00:12 - Management - Send 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > Closing TUN/TAP interface. 2016.12.07 00:00:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.07 00:00:17 - Connection terminated.I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.07 00:00:17 - IPv6 restored.! 2016.12.07 00:00:17 - Session terminated. If I could get some advice on how to fix this issue it would be much appreciated!
  7. Why is the download giving me version 2.10.3 and the changelog says Version 2.11.5?
  8. Hey, I have been using the Portable version of Eddie on my Ubuntu 16.04 installation with no problems, ever since the native Ubuntu client stopped working on 16.04 a few months ago. Earlier today, I booted my laptop up after about two weeks and got the recent set of updates for Ubuntu 16.04, which I've been running since April 2016. Post installing the updates and restarting the laptop, I tried running the portable Eddie 2.10 client by clicking the shortcut I've set up on the launcher. Nothing happened, no error message, no freeze and in fact no other sign that the icon had even been clicked. After restarting the computer, I again tried clicking on the launcher shortcut a few more times to no response. Since I had made no changes (or even turned on the laptop) since the last two weeks, I thought the recent set of updates to Ubuntu might have something to do with Eddie not launching or even giving an error. So I explored the AirVPN forums and came across these two links: https://airvpn.org/topic/17810-installing-portable-airvpn-client-version/ and https://airvpn.org/topic/18366-airvpn-portable-archlinux-x64-not-running/ that dicuss this problem. In order to follow the instructions in the above two links, I downloaded a new copy of Eddie 2.10 Portable client, extracted it on the Desktop and attempted to launch it in the Terminal (something I never had to do before) The output (which is similar to the errors described in the two links above) was as follows: gtnoob@Anonymous-Laptop:~/Desktop/airvpn_linux_x64_portable$ '/home/gtnoob/Desktop/airvpn_linux_x64_portable/airvpn' Unhandled Exception: System.TypeInitializationException: An exception was thrown by the type initializer for Mono.Unix.Native.Syscall ---> System.DllNotFoundException: $mono_libdir/libMonoPosixHelper.so at (wrapper managed-to-native) Mono.Unix.Native.Syscall:_L_ctermid () at Mono.Unix.Native.Syscall..cctor () [0x00000] in <filename unknown>:0 --- End of inner exception stack trace --- at AirVPN.Platforms.Linux.GetExecutablePath () [0x00000] in <filename unknown>:0 at AirVPN.Core.Platform.GetProgramFolder () [0x00000] in <filename unknown>:0 at AirVPN.Core.Engine.Initialization () [0x00000] in <filename unknown>:0 at AirVPN.UI.Linux.Program.Main () [0x00000] in <filename unknown>:0 [ERROR] FATAL UNHANDLED EXCEPTION: System.TypeInitializationException: An exception was thrown by the type initializer for Mono.Unix.Native.Syscall ---> System.DllNotFoundException: $mono_libdir/libMonoPosixHelper.so at (wrapper managed-to-native) Mono.Unix.Native.Syscall:_L_ctermid () at Mono.Unix.Native.Syscall..cctor () [0x00000] in <filename unknown>:0 --- End of inner exception stack trace --- at AirVPN.Platforms.Linux.GetExecutablePath () [0x00000] in <filename unknown>:0 at AirVPN.Core.Platform.GetProgramFolder () [0x00000] in <filename unknown>:0 at AirVPN.Core.Engine.Initialization () [0x00000] in <filename unknown>:0 at AirVPN.UI.Linux.Program.Main () [0x00000] in <filename unknown>:0 This error is almost the same as the error in the above two posts. The solution to the above error given in the first post linked above was to run the following command: sudo ln -s '/path/to/airvpn_linux_x64_portable/libMonoPosixHelper.so' '/usr/lib/libMonoPosixHelper.so' when I ran the command, after changing the path to the correct folder on my Dekstop, I got the following error: ln: failed to create symbolic link '/usr/lib/libMonoPosixHelper.so': File exists So essentially, the solution given in the first post linked above does not seem to work for me. Nothing else I've tried seems to work either. Clearly, something in the recent set of updates seems to have broken the Eddie 2.10 Portable Client from working on Ubuntu 16.04. I would greatly appreciate any help on how I could make this work! I am willing to provide any logs, information or time that may be needed for this to work. Thanks a ton for reading this rather long post all the way to the end and hope we can find a quick and effective solution (and get a new native client) soon!
  9. Hi, Just started with AirVPN. The VPN I am currently subscribed to, its term is ending this month. AirVPN looks really good. Considering switching to it when the current tem ends. Btw, off topic, it wasn't easy figuring out that there is a beta Eddie client for Windows. The `Enter` page links to the old 1.92 client. The 2.1 client is way way way better than the 1.92 client. The 1.92 client was a huge shock Anyway, getting to the topic, I didn't see any settings for auto-update in the Windows client. Is this built-in? When you release 2.2 or whichever is the next version, will I be notified automatically or do I need to keep following this forum? Regards, Amith
  10. Hi All, Since the Update, Im unable to connect via my DD-Wrt Setup Router, Using the OpenVPN Client.. I've Re-Downloaded the Keys/Certs & Re-Copied them, Iv'e checked 3 Times to see if they are in the correct Boxes. Iv'e tried Adding the "TLS-DHE-RSA ETC" 256 Bit. But it sticks & dosn't even Log anything. Does Nothing.. When i Choose "None" It goes into a Loop. ******Date & TIme Is Correct" As that error does point to a date error, but the date is fine.. as ive said, everything has been working Prior to the update...*****
×
×
  • Create New...