Search the Community
Showing results for tags 'Windows 10'.
Found 54 results
-
Hello For several months I have been using AirVPN on my Windows 10 machine. Before the PC started and AirVPN launched without problem. Since a Windows update some time ago (https://www.it-connect.fr/microsoft-windows-vpn-ne-fonctionne-plus-mise-a-jour-avril-2024/) most of the time AirVPN blocks. I have to launch the task manager and stop the "OpenVPN Daemon" process so that it continues to start. I have of course done all the Windows updates since then but that did not solve the problem. I also tried to follow the procedure indicated in the article above but I cannot find the offending KB. I also tried to uninstall and reinstall AirVPN but that did not solve anything. Has anyone found the solution? Thank you very much! 😉
-
Hello! Firstly, I have a win10 PC, and at this time was running Eddie with qbitrorrent 4.6.0, and Eddie and qB are binded via the torrent clients settings. I normally seed overnight and leave my PC and VPN running. This morning when I went to check on my PC, I saw a notification that at 3:47AM it disconnected and then reconnected 2 min later at 3:49AM. I checked the logs, and I don't really understand what happened exactly, but through some key words it appears the server was Inactive, had to restart, and attempted to reconnect (successfully)? Here's a screenshot of just part of the logs when it first disconnected, starting at 03:47:03, but will also attach the full .txt file. Now for my question: Is there something I need to do to fix this or is just an occasional occurrence, and this happens here and there? Since I had Network Lock activated, my IP was not leaked during that 2 minute disconnection, right? I searched the forums for a bit and saw that someone had a similar inactive error, but their issue may have been due to using the same server+key(?) for 2 devices. At this time, I only had Eddie running on one device (this PC). I do have it on another laptop, but that laptop has been completely off since the last week, so I don't think that would be the issue? Thanks in advance for any answers or information. Love the client, and my questions may be dumb, but I'm very interested in learning what happened so that I have a better understanding going forward. Eddie_20231117_075642.txt
-
I'm planning on making the VPN work on a headless Windows 10 machine. Using Eddie-UI.exe I see there seems to be an option under "General" that says "If checked, install a Windows Service", but there is no check (a bug?) Also tried using Eddi-CLI.exe and installing it as a service via NSSM, but it doesn't load. The Event Viewer logs says it keeps restarting. Any other ideas? Thanks
-
Yesterday, i upgraded from Windows 10 1909 Home x64, to Windows 10 20H2 (Home) x64, and my VPN did work just fine before the upgrade i am having problems now since the upgrade to the new version of windows 10, where things are not working. I can login to AirVPN with my account (sometimes it gives me a "can't bootstrap error"?), and i can lock my network, AND I CAN connect to a AirVPN server ... but when using my browser after all of this, NO WEBPAGES come up once "connected" - why? Eddie says i am connected (i use the windows GUI for x64), and it shows data up and down, in kbits, but the real proof of it is not there (Firefox is not letting me get any webpage over the VPN connection). i tried uninstalling Eddie, AFTER the windows 10 upgrade, and then re-installing Eddie. SAME PROBLEM. Incidentally during or after the windows 10 upgrade, it removed my VirtualBox adapter .... and i wonder if that was part of the probem. I am not wanting help here with virtualbox adapters lol so no worry there, but i just wondered if that was related to the issue? i dont know if the windows upgrade also jimmied with the TAP v9 adapter which Eddie uses or not? i do not know what is going on and i really just wanna use my paid service and be a happy customer. Please help. Thanks.
-
I have been using Open VPN for a few years now but today it refuses to open in Windows 10. Eddie is apparently running, holds the computer open when trying to restart. If I try and run again it states that it is already running. I have tried remove and reinstall but get the same result. Any thoughts/suggestions would be appreciated.
-
Hi, Recently, I am experiencing long waiting times (20+ mins) for Eddie to start up and run in Windows 10. Apparently, the program tries to "delete routes", trying - without success - to do the same thing over and over again. Here is what happens: Eddie version: 2.16.3Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 ProOS version: Microsoft Windows NT 10.0.17134.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Program Files\AirVPN\default.xmlData path: C:\Program Files\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\Eddie-UI.exeCommand line arguments: (0 args) Network Lock Active: Yes, Windows Filtering PlatformConnected to VPN: Yes, SpicaDetected DNS: 10.30.172.1, 181.213.132.2, 181.213.132.3, 2804:14d:1:0:181:213:132:2, 2804:14d:1:0:181:213:132:3, fde6:7a:7d20:1aac::1Test DNS IPv4: OkTest DNS IPv6: OkTest Ping IPv4: 170 msTest Ping IPv6: 156 msTest HTTP IPv4: OkTest HTTP IPv6: OkTest HTTPS: Ok----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Truenetlock: Trueservers.whitelist: 04c8003cc011ead147020baa01cb5301b409a49bddea1291127c67e1b156b6ce,7dce595b16ae39e6d37cf81b100e008651fbaaaf237caebbfa77842c33c816ec,2c99a52815c8fe1d14379c250894e5375c20742afe6092eb26e297261ca46146,3b1730f6ce5e57fba3f83c064992bacd521e409a3d4bf84de3b2e1becf0c953e,3e476d0dbfee71775c28855154a0946698afcfdc24c6c624a7be9d52864d2a24,a86c97a9b8fbbd4fa64734cd34a0dbde94cb28b8e32ad9312b090fa88f0ad002,13f7192498028afd153ba517b2308f5d502117879cab3d6e65eadf22da0191b4,ee007e611ec83d4639229dcdea940c28355e4e069636fe7afe155638abd41d42,03aa4890d313517d56d3c9e60762bee0ddf4ba331e84f2895672dc4d00843985,5102c436d182218aeac230b411f7d39b995225e63afa82627c6d8033315d4462,19b5c7333f2cce1a07c093e556c7fa68af4cea13237d528fd9100c6190250112,f5d73829120274d7788690ad00fe8b8c715254226b85f65f06691c061a6517a6,937673889b0f5310ff05026b4fb16cf6397fe799748ef9dcd48da67bccb534b9,d69a9d9dc0d43b63b3e64d816ee7029a4da743426f7d6f9f8221e84c6155721f,600bb65180381071c7d4e7e6f472233b6d0caeaabddf5ca2690a978fb59111dc,82ac7c8f54a8ad422dbfe877207bc7d308e651e611a37523238584b83693b55e,db34d07034f09d8832eb33595a9813167aee65dabdbfa9d67b439f937babc332,f574bc585b9667eb5d34187ee9a5e92f827aff8b47dd7279f867e37079657b4c,49048b88453921e46768bb49a049e9cc2dc8cac6451a53db5261fd2aebf92366,4a753c464da67849afcf7be670e0300c9239e1811d07e03d5caa7f4804e5d104,3858a066dafe1ecd6f5e898755e88ab035aa6ba80664cdc19c18c1465fae95c6,b13669ff16ae7e6153750034ca95edcca78da0983ff27e11b8b3e8b2989db680ui.skip.provider.manifest.failed: True ----------------------------Logs: . 2018.11.25 10:52:34 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.11.25 10:52:35 - Reading options from C:\Program Files\AirVPN\default.xml. 2018.11.25 10:52:44 - Command line arguments (0):. 2018.11.25 10:52:44 - Profile path: C:\Program Files\AirVPN\default.xml. 2018.11.25 10:53:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.11.25 10:53:40 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.11.25 10:53:40 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.11.25 10:53:41 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.11.25 10:53:41 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.11.25 10:53:41 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pemW 2018.11.25 10:53:49 - Recovery. Unexpected crash?. 2018.11.25 10:54:07 - Routes, remove 91.207.57.115 for gateway 10.6.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:54:45 - Above log line repeated 3 times more. 2018.11.25 10:54:45 - Routes, remove 184.75.221.59 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:54:55 - Routes, remove 184.75.223.235 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:05 - Routes, remove 91.207.57.115 for gateway 10.12.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:14 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:43 - Above log line repeated 2 times more. 2018.11.25 10:55:43 - Routes, remove 213.152.161.117 for gateway 10.5.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:53 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:03 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:12 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:22 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:31 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:41 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:50 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:00 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:19 - Above log line repeated 1 times more. 2018.11.25 10:57:19 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:29 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:38 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:48 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:58 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:07 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:17 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:26 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:36 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:46 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:55 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:05 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:24 - Above log line repeated 1 times more. 2018.11.25 10:59:24 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:33 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:43 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:52 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:02 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:11 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:21 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:30 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:40 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:06 - Above log line repeated 2 times more. 2018.11.25 11:01:06 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:15 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:25 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:34 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:43 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:53 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:02 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:12 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:21 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:30 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:40 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:49 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:59 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:08 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:17 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:27 - Routes, remove 213.152.161.20 for gateway 10.29.4.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:36 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:46 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:55 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:04 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:14 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:20 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:29 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:39 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:48 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:58 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:07 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:16 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:35 - Above log line repeated 1 times more. 2018.11.25 11:05:35 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:45 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:03 - Above log line repeated 1 times more. 2018.11.25 11:06:03 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:13 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:22 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:32 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:41 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:50 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:00 - Routes, remove 199.19.94.135 for gateway 10.27.204.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:28 - Above log line repeated 2 times more. 2018.11.25 11:07:28 - Routes, remove 64.42.179.51 for gateway 10.23.140.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:37 - Routes, remove 199.19.94.135 for gateway 10.27.204.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:47 - Routes, remove 184.75.221.163 for gateway 10.9.44.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:56 - Routes, remove 184.75.214.163 for gateway 10.13.108.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:11 - Routes, remove 199.19.94.16 for gateway 10.6.236.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:21 - Routes, remove 162.219.176.3 for gateway 10.6.108.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:39 - Above log line repeated 1 times more. 2018.11.25 11:08:39 - Routes, remove 199.19.94.193 for gateway 10.30.172.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:46 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.6.100.1). 2018.11.25 11:08:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)! 2018.11.25 11:08:55 - Deactivation of Network Lock! 2018.11.25 11:08:55 - Activation of Network Lock - Windows Filtering Platform. 2018.11.25 11:08:56 - Updating systems & servers data ...I 2018.11.25 11:08:56 - Session starting.. 2018.11.25 11:09:04 - Systems & servers data update completedI 2018.11.25 11:09:07 - Checking authorization ...! 2018.11.25 11:09:14 - Connecting to Spica (Canada, Toronto, Ontario). 2018.11.25 11:09:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.11.25 11:09:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.11.25 11:09:20 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.11.25 11:09:20 - Connection to OpenVPN Management Interface. 2018.11.25 11:09:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.11.25 11:09:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.11.25 11:09:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.11.25 11:09:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.19:443. 2018.11.25 11:09:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.11.25 11:09:20 - OpenVPN > UDP link local: (not bound). 2018.11.25 11:09:20 - OpenVPN > UDP link remote: [AF_INET]199.19.94.19:443. 2018.11.25 11:09:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.11.25 11:09:20 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=fc270323 bb5f1333. 2018.11.25 11:09:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.11.25 11:09:21 - OpenVPN > VERIFY KU OK. 2018.11.25 11:09:21 - OpenVPN > Validating certificate extended key usage. 2018.11.25 11:09:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.11.25 11:09:21 - OpenVPN > VERIFY EKU OK. 2018.11.25 11:09:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Spica, emailAddress=info@airvpn.org. 2018.11.25 11:09:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.11.25 11:09:21 - OpenVPN > [spica] Peer Connection Initiated with [AF_INET]199.19.94.19:443. 2018.11.25 11:09:22 - OpenVPN > SENT CONTROL [spica]: 'PUSH_REQUEST' (status=1). 2018.11.25 11:09:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.172.1,dhcp-option DNS6 fde6:7a:7d20:1aac::1,tun-ipv6,route-gateway 10.30.172.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1aac::104e/64 fde6:7a:7d20:1aac::1,ifconfig 10.30.172.80 255.255.255.0,peer-id 12,cipher AES-256-GCM'. 2018.11.25 11:09:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.11.25 11:09:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.11.25 11:09:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.11.25 11:09:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.11.25 11:09:22 - OpenVPN > interactive service msg_channel=0. 2018.11.25 11:09:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=6 HWADDR=bc:5f:f4:1f:c7:bf. 2018.11.25 11:09:22 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.11.25 11:09:22 - OpenVPN > GetBestInterfaceEx() returned if=6. 2018.11.25 11:09:22 - OpenVPN > GDG6: II=6 DP=::/0 NH=fe80::4ed0:8aff:fe9b:57c6. 2018.11.25 11:09:22 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.11.25 11:09:22 - OpenVPN > ROUTE6_GATEWAY fe80::4ed0:8aff:fe9b:57c6 I=6. 2018.11.25 11:09:22 - OpenVPN > open_tun. 2018.11.25 11:09:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8102CA7C-1815-41AD-80D0-0D9289816985}.tap. 2018.11.25 11:09:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.11.25 11:09:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.172.0/10.30.172.80/255.255.255.0 [sUCCEEDED]. 2018.11.25 11:09:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.172.80/255.255.255.0 on interface {8102CA7C-1815-41AD-80D0-0D9289816985} [DHCP-serv: 10.30.172.254, lease-time: 31536000]. 2018.11.25 11:09:23 - OpenVPN > Successful ARP Flush on interface [8] {8102CA7C-1815-41AD-80D0-0D9289816985}. 2018.11.25 11:09:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.11.25 11:09:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=8 fde6:7a:7d20:1aac::104e store=active. 2018.11.25 11:09:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1aac::1 validate=no. 2018.11.25 11:09:46 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2018.11.25 11:09:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1aac::/64 -> fde6:7a:7d20:1aac::104e metric 0) dev Ethernet 2. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1aac::/64 interface=8 fe80::8 store=active. 2018.11.25 11:09:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:09:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.19 MASK 255.255.255.255 192.168.0.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.172.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.172.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=8 fe80::8 store=active. 2018.11.25 11:09:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:09:54 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:09:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=8 fe80::8 store=active. 2018.11.25 11:09:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:10:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=8 fe80::8 store=active. 2018.11.25 11:10:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:06 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:10:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=8 fe80::8 store=active. 2018.11.25 11:10:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.11.25 11:10:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.11.25 11:10:13 - DNS leak protection with packet filtering enabled.. 2018.11.25 11:10:41 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.6.100.1) to 10.30.172.1). 2018.11.25 11:10:51 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1aac::1). 2018.11.25 11:11:00 - Routes, added a new route, 199.19.94.193 for gateway 10.30.172.1. 2018.11.25 11:11:10 - Routes, added a new route, 2604:6880:c713:5e13:a196:b899:41c7:3787 for gateway fde6:7a:7d20:1aac::1. 2018.11.25 11:11:10 - Flushing DNSI 2018.11.25 11:11:32 - Checking route IPv4I 2018.11.25 11:11:39 - Checking route IPv6I 2018.11.25 11:11:54 - Checking DNS! 2018.11.25 11:12:01 - Connected.. 2018.11.25 11:12:01 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces and Routes: {"support_ipv4": true,"support_ipv6": true,"routes": [{"address": "0.0.0.0\/0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "192.168.0.1","metric": "35"},{"address": "0.0.0.0\/1","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "3"},{"address": "10.30.172.0\/24","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "10.30.172.80","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "10.30.172.255","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "127.0.0.0\/8","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.0.0.1","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.255.255.255","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "128.0.0.0\/1","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "3"},{"address": "192.168.0.0\/24","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "192.168.0.12","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "192.168.0.255","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "199.19.94.19","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "192.168.0.1","metric": "35"},{"address": "199.19.94.193","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "4"},{"address": "224.0.0.0\/4","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "224.0.0.0\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "224.0.0.0\/4","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "255.255.255.255","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "255.255.255.255","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "255.255.255.255","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "::\/0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "fe80::4ed0:8aff:fe9b:57c6","metric": "291"},{"address": "::\/3","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "::1","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "2000::\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "2604:6880:c713:5e13:a196:b899:41c7:3787","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fde6:7a:7d20:1aac::1","metric": "259"},{"address": "2804:14d:5c52:83a1::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "fe80::4ed0:8aff:fe9b:57c6","metric": "291"},{"address": "2804:14d:5c52:83a1::a","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1:b5f8:315a:6f2:7db0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1:e8bd:b183:fbfb:79de","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "3000::\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fc00::\/7","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fde6:7a:7d20:1aac::\/64","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fde6:7a:7d20:1aac::104e","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::\/64","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "fe80::3550:350a:671e:cd7","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::e8bd:b183:fbfb:79de","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "ff00::\/8","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "ff00::\/8","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "ff00::\/8","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2604:6880:c713:5e13:a196:b899:41c7:3787","gateway": "fde6:7a:7d20:1aac::1","metric": "4294967295"}],"interfaces": [{"friendly": "Ethernet 2","id": "{8102CA7C-1815-41AD-80D0-0D9289816985}","name": "Ethernet 2","description": "TAP-Windows Adapter V9","type": "Ethernet","status": "Up","bytes_received": "154274","bytes_sent": "128022","support_ipv4": true,"support_ipv6": true,"ips": ["fde6:7a:7d20:1aac::104e","fe80::3550:350a:671e:cd7","10.30.172.80"],"gateways": ["10.30.172.1","fe80::8","fde6:7a:7d20:1aac::1"],"bind": true,"dns4": "10.30.172.1","dns6": null},{"friendly": "Ethernet","id": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","name": "Ethernet","description": "Realtek PCIe FE Family Controller","type": "Ethernet","status": "Up","bytes_received": "29659430","bytes_sent": "2895452","support_ipv4": true,"support_ipv6": true,"ips": ["2804:14d:5c52:83a1::a","2804:14d:5c52:83a1:e8bd:b183:fbfb:79de","2804:14d:5c52:83a1:b5f8:315a:6f2:7db0","fe80::e8bd:b183:fbfb:79de","192.168.0.12"],"gateways": ["192.168.0.1","fe80::4ed0:8aff:fe9b:57c6"],"bind": true,"dns4": "","dns6": null},{"friendly": "Loopback Pseudo-Interface 1","id": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","name": "Loopback Pseudo-Interface 1","description": "Software Loopback Interface 1","type": "Loopback","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["::1","127.0.0.1"],"gateways": [],"bind": true,"dns4": "","dns6": null}],"ipv4-default-gateway": "10.30.172.1","ipv4-default-interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","ipv6-default-gateway": "fe80::8","ipv6-default-interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}"}----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Arbeitszimmer Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : rjo.virtua.com.br Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-81-02-CA-7C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1aac::104e(Preferred) Link-local IPv6 Address . . . . . : fe80::3550:350a:671e:cd7%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.30.172.80(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : November 25, 2018 11:09:22 Lease Expires . . . . . . . . . . : November 25, 2019 11:09:22 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.30.172.254 DHCPv6 IAID . . . . . . . . . . . : 369164161 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-D8-B7-B7-BC-5F-F4-1F-C7-BF DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1aac::1 10.30.172.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : rjo.virtua.com.br Description . . . . . . . . . . . : Realtek PCIe FE Family Controller Physical Address. . . . . . . . . : BC-5F-F4-1F-C7-BF DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2804:14d:5c52:83a1::a(Preferred) Lease Obtained. . . . . . . . . . : November 25, 2018 10:44:40 Lease Expires . . . . . . . . . . : November 26, 2018 10:44:39 IPv6 Address. . . . . . . . . . . : 2804:14d:5c52:83a1:e8bd:b183:fbfb:79de(Preferred) Temporary IPv6 Address. . . . . . : 2804:14d:5c52:83a1:b5f8:315a:6f2:7db0(Preferred) Link-local IPv6 Address . . . . . : fe80::e8bd:b183:fbfb:79de%6(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.12(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : November 25, 2018 10:44:39 Lease Expires . . . . . . . . . . : November 25, 2018 11:44:38 Default Gateway . . . . . . . . . : fe80::4ed0:8aff:fe9b:57c6%6 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 113008628 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-D8-B7-B7-BC-5F-F4-1F-C7-BF DNS Servers . . . . . . . . . . . : 2804:14d:1:0:181:213:132:2 2804:14d:1:0:181:213:132:3 181.213.132.2 181.213.132.3 NetBIOS over Tcpip. . . . . . . . : Enabled Any fix available? Thanks in advance.
-
Hi, I'm running the AirVPN Eddie client on my Windows 10 64-bit machines. I was recently unable to connect to my network, but not the internet or AirVPN and remembered I had the same problem on my other machine a few months ago and this forum gave me a solution. It involved setting the IPv4 to my preferred connection through a netsh powershell command. Doing this fix I noticed that there were 50 different ethernet connections that Eddie has created and I was wondering if there is a way to delete these connections to prevent any issues moving forward? A couple screenshots for clarity:
-
Hi, I've purchased a Windows 10 PC and I'm not overly familiar with the OS, other than the basics. I've installed Eddie and and signed in ok, but when I try to connect to any server Eddie gets to "Checking Route IPv6" and then fails to connect Then Eddie disconnects and tries to reconnect only to fail again. I'm at a loss of what to do. Any suggestions are welcomed. Thank you.
-
ANSWERED Driver Installation Failed on connect
MikeFromIT posted a topic in Troubleshooting and Problems
Every time I try to connect I get an error message saying driver installation failed and I never actually connect. In the logs I see two things that seem to be related. "cannot find tunnel adapter" and "driver installation failed'. Any tips on what I should try to do to fix this? I 2018.02.23 18:48:00 - Session starting.. 2018.02.23 18:48:00 - Cannot find tunnel adapter.! 2018.02.23 18:48:00 - Installing tunnel driver. 2018.02.23 18:48:00 - Shell(7) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';. 2018.02.23 18:48:01 - Shell(7) done in 719 ms, exit: 0. 2018.02.23 18:48:04 - Cannot find tunnel adapter.F 2018.02.23 18:48:04 - Driver installation failed. -
Hy guys, so i´ve been using Air VPN on a regular basis, but not since 1 Month or so. Today i´ve tried o connect via "automatic connection" and everything went fine until after the connection has been established it always "restarts". Strange thing is, i have to log into AirVPN via browser and disconnect my client from those connections because i get the max of 5 connections per user very fast. Manual connection does the same. Creators Update? Im using an up to date Windows 10, my internet works fine aside from Eddy. I will attach my Log file in case u will need it. Thanks in advance Eddie_20171226_080649.txt
-
I use Eddie on a Windows 10 x64 laptop, and had very few issues, and I solved all of them through very simple settings within Eddie after reading here. Recently I went to stay with a friend for a few weeks, I had been there before and haven't experienced any AirVPN-related issue associated with these visits. This time around, when I got back home again, I simply couldn't connect to the internet. All my other devices could connect to the internet (both cable and wireless), one of them (Xbox One) did suffer pretty badly from dc's if connected through wifi, but the phone and the Smart TV had good and stable wireless connection throughout the whole ordeal (and the Xbox worked flawless if connected through cable). The laptop, however, couldn't connect at all, cable or wireless didn't matter. I uninstalled Eddie, problem remained. Before this I had of course rebooted all hardware and powercycled everything in the entire network several times, I updated (or checked for updates) everything I could - hardware, software, firmware. Double and tripple checked all DNS- and IP-related settings, flushed, released and reset pretty much everything I could. On the third day I found a working combo.. change and give the laptop a static IP, uninstall VMWare Workstation, use OpenVPN instead of Eddie. If I try to use Eddie, then I can't connect to internet at all. If I re-install VMWare Workstation, same thing. If either of these are installed, I can't connect to internet even with Eddie not even running. And even with my working current config (static IP, no VMWare Workstation or Eddie installed, only OpenVPN, internet dies if I change back to DHCP / assign automatic IP. As long as it's on static, however, everything works just like it used to do with Eddie and VMWare - can connect with and without VPN, can use virtual machines and virtual network adapters (but with VirtualBox and so on instead of VMWare), nothing changes if I temporary use it on another WiFi and then get back home to my own network (cable or wireless doesn't make any difference). Anyone know what could be the issue here? I can connect now, and I guess OpenVPN serves me well although I have to learn a new application to modify the config file to be as safe as the setup I had in Eddie, but it's weird and I'd rather use the software I actually want to use. Especially when it comes to VMWare Workstation (it also worked fine with AirVPN before my trip / switching wifi temporary). I know, I should've saved logs, and I understand that I might not be able to recieve a very specific awnser here. But it's so weird and I have a feeling that I really must have missed something very, very basic..?
- ...
-
- AirVPN
- Windows 10
- VMWare
- Virtual Machines
- Different
- Wifi
- Networks
- Connectivity
-
(and 7 more)
Tagged with:
-
Hi, I'm getting an error when trying to connect on Windows 10. It says: "OpenVPN: Route gateway is not reachable on any active network adapters: 10.4.0.1". It didn't do this when I first installed AirVPN Client. How can I fix this? Thanks
-
Hey Guys, i had to reinstall my Windows on my Notebook. After the reinstall from Windows 10 (+ creators update) and the AirVPN Client, the issue started. The AirVPN Client cant connect to any server. I already googled it but couldn´t find a solution. I 2017.07.18 10:10:16 - Eddie client version: 2.13.2 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.15063.0, Mono/.Net Framework: v4.0.30319 . 2017.07.18 10:10:16 - Reading options from C:\Users\uemit\AppData\Local\AirVPN\AirVPN.xml . 2017.07.18 10:10:16 - Data path: C:\Users\uemit\AppData\Local\AirVPN . 2017.07.18 10:10:16 - Application path: C:\Program Files\AirVPN . 2017.07.18 10:10:16 - Executable path: C:\Program Files\AirVPN\AirVPN.exe . 2017.07.18 10:10:16 - Command line arguments (1): path="home" . 2017.07.18 10:10:16 - Operating System: Microsoft Windows NT 10.0.15063.0 I 2017.07.18 10:10:19 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2017.07.18 10:10:19 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) I 2017.07.18 10:10:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2017.07.18 10:10:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2017.07.18 10:10:19 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe) I 2017.07.18 10:10:19 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2017.07.18 10:10:19 - Ready . 2017.07.18 10:10:19 - Updating systems & servers data ... . 2017.07.18 10:10:20 - Systems & servers data update completed I 2017.07.18 10:10:38 - Session starting. . 2017.07.18 10:10:39 - IPv6 disabled with packet filtering. I 2017.07.18 10:10:39 - Checking authorization ... ! 2017.07.18 10:10:39 - Connecting to Edasich (Netherlands, Alblasserdam) . 2017.07.18 10:10:39 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2017.07.18 10:10:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.07.18 10:10:39 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.07.18 10:10:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.07.18 10:10:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:10:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:10:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.07.18 10:10:39 - OpenVPN > UDP link local: (not bound) . 2017.07.18 10:10:39 - OpenVPN > UDP link remote: [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:39 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.210:443, sid=98912455 955b8479 . 2017.07.18 10:10:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.07.18 10:10:39 - OpenVPN > VERIFY KU OK . 2017.07.18 10:10:39 - OpenVPN > Validating certificate extended key usage . 2017.07.18 10:10:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.07.18 10:10:39 - OpenVPN > VERIFY EKU OK . 2017.07.18 10:10:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Edasich, emailAddress=info@airvpn.org . 2017.07.18 10:10:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.07.18 10:10:39 - OpenVPN > [Edasich] Peer Connection Initiated with [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:41 - OpenVPN > SENT CONTROL [Edasich]: 'PUSH_REQUEST' (status=1) . 2017.07.18 10:10:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.36.112 255.255.0.0,peer-id 18,cipher AES-256-GCM' . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.07.18 10:10:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2017.07.18 10:10:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.07.18 10:10:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.07.18 10:10:41 - OpenVPN > interactive service msg_channel=0 . 2017.07.18 10:10:41 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=11 HWADDR=20:89:84:d6:92:b8 . 2017.07.18 10:10:41 - OpenVPN > open_tun . 2017.07.18 10:10:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{7C4E21EF-6F14-408D-A99B-9E866F69E945}.tap . 2017.07.18 10:10:41 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.07.18 10:10:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.36.112/255.255.0.0 [SUCCEEDED] . 2017.07.18 10:10:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.36.112/255.255.0.0 on interface {7C4E21EF-6F14-408D-A99B-9E866F69E945} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.07.18 10:10:41 - OpenVPN > Successful ARP Flush on interface [10] {7C4E21EF-6F14-408D-A99B-9E866F69E945} . 2017.07.18 10:10:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.07.18 10:10:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.210 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this . 2017.07.18 10:10:47 - Starting Management Interface . 2017.07.18 10:10:47 - OpenVPN > Initialization Sequence Completed . 2017.07.18 10:10:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2017.07.18 10:10:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2017.07.18 10:10:47 - DNS leak protection with packet filtering enabled. . 2017.07.18 10:10:47 - Flushing DNS I 2017.07.18 10:10:50 - Checking route . 2017.07.18 10:11:00 - curl: (28) Operation timed out after 10046 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:00 - Checking route (2° try) . 2017.07.18 10:11:11 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:11 - Checking route (3° try) . 2017.07.18 10:11:24 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received E 2017.07.18 10:11:24 - Checking route failed. . 2017.07.18 10:11:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.07.18 10:11:24 - Disconnecting . 2017.07.18 10:11:24 - Management - Send 'signal SIGTERM' . 2017.07.18 10:11:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.07.18 10:11:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.07.18 10:11:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.07.18 10:11:24 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.210 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > Closing TUN/TAP interface . 2017.07.18 10:11:30 - OpenVPN > TAP: DHCP address released . 2017.07.18 10:11:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.07.18 10:11:30 - Connection terminated. . 2017.07.18 10:11:30 - DNS leak protection with packet filtering disabled. . 2017.07.18 10:11:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2017.07.18 10:11:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2017.07.18 10:11:33 - Checking authorization ... ! 2017.07.18 10:11:33 - Connecting to Asellus (Netherlands, Alblasserdam) . 2017.07.18 10:11:33 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2017.07.18 10:11:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.07.18 10:11:33 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.07.18 10:11:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.07.18 10:11:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.07.18 10:11:33 - OpenVPN > UDP link local: (not bound) . 2017.07.18 10:11:33 - OpenVPN > UDP link remote: [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:33 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=b55dc02b a862b75b . 2017.07.18 10:11:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.07.18 10:11:34 - OpenVPN > VERIFY KU OK . 2017.07.18 10:11:34 - OpenVPN > Validating certificate extended key usage . 2017.07.18 10:11:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.07.18 10:11:34 - OpenVPN > VERIFY EKU OK . 2017.07.18 10:11:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.07.18 10:11:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.07.18 10:11:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:35 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.07.18 10:11:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.86.229 255.255.0.0' . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.07.18 10:11:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.07.18 10:11:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.07.18 10:11:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:35 - OpenVPN > interactive service msg_channel=0 . 2017.07.18 10:11:35 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=11 HWADDR=20:89:84:d6:92:b8 . 2017.07.18 10:11:35 - OpenVPN > open_tun . 2017.07.18 10:11:35 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{7C4E21EF-6F14-408D-A99B-9E866F69E945}.tap . 2017.07.18 10:11:35 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.07.18 10:11:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.86.229/255.255.0.0 [SUCCEEDED] . 2017.07.18 10:11:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.86.229/255.255.0.0 on interface {7C4E21EF-6F14-408D-A99B-9E866F69E945} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.07.18 10:11:35 - OpenVPN > Successful ARP Flush on interface [10] {7C4E21EF-6F14-408D-A99B-9E866F69E945} . 2017.07.18 10:11:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.07.18 10:11:40 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this . 2017.07.18 10:11:40 - Starting Management Interface . 2017.07.18 10:11:40 - OpenVPN > Initialization Sequence Completed . 2017.07.18 10:11:40 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2017.07.18 10:11:40 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2017.07.18 10:11:40 - DNS leak protection with packet filtering enabled. . 2017.07.18 10:11:40 - Flushing DNS I 2017.07.18 10:11:43 - Checking route . 2017.07.18 10:11:53 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:53 - Checking route (2° try) . 2017.07.18 10:12:04 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:12:04 - Checking route (3° try) . 2017.07.18 10:12:16 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received E 2017.07.18 10:12:16 - Checking route failed. . 2017.07.18 10:12:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.07.18 10:12:17 - Disconnecting . 2017.07.18 10:12:17 - Management - Send 'signal SIGTERM' . 2017.07.18 10:12:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.07.18 10:12:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.07.18 10:12:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > Closing TUN/TAP interface . 2017.07.18 10:12:22 - OpenVPN > TAP: DHCP address released . 2017.07.18 10:12:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.07.18 10:12:22 - Connection terminated. . 2017.07.18 10:12:22 - DNS leak protection with packet filtering disabled. . 2017.07.18 10:12:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2017.07.18 10:12:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2017.07.18 10:12:24 - Cancel requested. . 2017.07.18 10:12:24 - IPv6 restored with packet filtering. . 2017.07.18 10:12:24 - Flushing DNS ! 2017.07.18 10:12:27 - Session terminated. . 2017.07.18 10:20:38 - Updating systems & servers data ... . 2017.07.18 10:20:39 - Systems & servers data update completed
-
Hello users and staff of AirVPN. I have been using AirVPN for months now and the entire time I have had a dns leak. I currently use dnscrypt, but that did not affect my own openvpn connections or AirVPN connections when I was using Windows 7. I have disabled dnscrypt and switched to normal google dns servers then connected to airvpn or my own servers, still I have dns leaks. I have disabled IPv6, still I have dns leaks. I have disabled multi-honed dns in windows 10, still I have dns leaks. I have even used the option "setenv opt block-outside-dns" in my own openvpn configs.... STILL I HAVE DNS LEAKS. How can I fix dns leaks in windows 10?
-
hi airvpn forums, i have been using airvpn for 20 days now and the service as a whole has exceeded my expectations. i'm currently getting the following pop up notification and message in my logs. "Warning: route gateway is ambiguous: 192.1xx.x.xxx (2 matches)" i'm still able to connect to the internet. i pass ip, dns and torrent detection tests at ipleak.net. i have seen a similar post in these forums but they had connectivity issues because of it. is this leaking my ip/details to the public? or is there anything else (security or otherwise) i should be worried about? billion model bipac 7404vgpx, latest version of windows 10, eddie 2.12.4 with network lock activated. my logs are attached. the warning in this file can be found 16 lines from the bottom. i receive the warning at the beginning or during a session. warning gateway is ambiguous.txt
-
I too needed a long time before I knew how to get a printer and scanner working while online when using a VPN with either OpenVPN or Eddie the Client of AirVPN. Well the answer is much simpler than you think. You need to give your printer an IP4 address that does not change. Like 192.168.1.123 as long as you always make sure it looks like your Router IP4 Gateway adress. My printer has IP address 192.168.1.123 and if you don't understand how to do that either from within your router DHCP or from the printer itself I cannot help you unfortunately. My printer is simply at this IP4 address via a Wireless Wifi connection at the same router which has address 192.168.1.1 as most Routers do. But yours might look different. The problem with Windows 10 automatic discovery of printers and scanners it searches all network adapters and it might detect your printers and scanners even like it does here, but when on VPN I couldn't print or scan. Actually the scanner didn't even work before I knew the tricks how to install the same printer manually from an IP4 address by hand. In Windows 10 right click the start button if your right handed with your right mouse button and enter command below: control printers I would have liked to show a screenshot here but my language isn't English, so I describe that after you execute that command a Window pops up showing you devices like printers and scanners even when they might not work. Now look carefully inside that window, what does it say? ADD PRINTERbut then in your language. Well press that button. Another window pops up trying to discover devices on your network, but you should look for and press the text PRINTER I WANT IS NOT ON THIS LIST Now the magic starts to happen. It has many options to add a Printer, but you know you want a local network printer search for ADD PRINTER WITH TCP/IP ADDRESSBut then again it is in your own language but look for TCP/IP and press that option. Then press NEXT button. Another window pops up, leave automatic detection enabled. And guess what, it asks for the IP4 address for your printer, don't worry about port name that will be automatically filled. Type in your Printer IP4 address inside the IP text Area 192.168.1.123was my Printer IP4 address on my local network. Then it might ask for a driver, if you have none choose a printer that is a version higher but of same type. If you have a Deskjet choose a similar Deskjet, if you have a Laser choose a similar Laser. In my case I simply had the original driver which actually isn't necessary at all. If your printer is 4000 series and you see a driver called 4070 series try that, as long as it is the same brand of printer and same type of printer (Deskjet=Deskjet and Laser=Laser etcetera) Usually you don't need a driver at this point. Wireless printers communicate with a standard protocol hence Linux Operating Systems almost always too easily support printers and scanners. Then you have to press a few times NEXT, NEXT and maybe another NEXT. Make sure you remember how your new manually added printer that only communicates inside your local network outside any VPN is called. Software using printers or scanners like a webbrowser need a simple adjustment. That is when you print you must select the new printer or scanner you just added by hand. Please let me know if this works for you, and if you are English, can you do these steps with screenshots and place them in yours? I have a strange language you don't understand, So hence my screenshots would not explain it to you, but in English it does. I cannot for example tell you how to access the configuration panel in your language but that is why I told you it all starts with a simple command to execute control printers In my case my scanner wasn't even working without VPN and when I executed MSPAINT.EXE, I could even scan wireless when either with or without VPN enabled or disabled. Before I could only print or install hundreds of Megabytes from HP Printer Driver. Remember the name and IP4 address from your printer that is all you need. Don't rely on auto detection when on VPN.
-
I have been using Spybot Anti-beacon since before the creators update. It appears to still be working after the update to creators. Are there any other pieces of software that I could use to block telemetry?
-
I cannot use the VPN, new installation ! 2017.04.14 15:12:01 - Connecting to Agena (Canada, Toronto, Ontario) .......(all ok until)........ . 2017.04.14 15:12:07 - Flushing DNS I 2017.04.14 15:12:10 - Checking route E 2017.04.14 15:12:11 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:11 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:11 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:11 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:11 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:11 - using the --cacert option. E 2017.04.14 15:12:11 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:11 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:11 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:11 - not match the domain name in the URL). E 2017.04.14 15:12:11 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:11 - the -k (or --insecure) option. . 2017.04.14 15:12:11 - Checking route (2° try) E 2017.04.14 15:12:12 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:12 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:12 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:12 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:12 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:12 - using the --cacert option. E 2017.04.14 15:12:12 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:12 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:12 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:12 - not match the domain name in the URL). E 2017.04.14 15:12:12 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:12 - the -k (or --insecure) option. . 2017.04.14 15:12:12 - Checking route (3° try) E 2017.04.14 15:12:15 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:15 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:15 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:15 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:15 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:15 - using the --cacert option. E 2017.04.14 15:12:15 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:15 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:15 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:15 - not match the domain name in the URL). E 2017.04.14 15:12:15 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:15 - the -k (or --insecure) option. E 2017.04.14 15:12:15 - Routing checking failed. . 2017.04.14 15:12:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.04.14 15:12:15 - Disconnecting
-
Hello, I am unable to connect using AirVPN to any server. I have tried the FAQ located at http://openvpn.net/faq.html#dhcpclientserv but still cannot connect. System Info Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319 Operating System: Microsoft Windows NT 10.0.14393.0 OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 When trying to connect I get this about 25 times OpenVPN > Route: Waiting for TUN/TAP interface to come up... Eddie Windows Interface Hack executed (AirVPN) OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down Key Log Info OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 OpenVPN > Route addition via IPAPI failed [adaptive] OpenVPN > Route addition fallback to route.exe ~~~~~~~ Starting Management Interface penVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) Disconnecting Send 'signal SIGTERM' Full Log Any ideas? Thanks
-
Whenever I read something about Windows 10, be it a news article or a forum post, I also read the word "privacy nightmare". It refers to excessive data collection practices by Microsoft's new operating system. Some of these can't even be disabled by going the usual way using built-in settings. Luckily, these are the forums of a VPN provider where you can find guides on what to look out for when you want to forcibly shut down the unnecessary "spying". And I wanted to contribute to this by introducing software which helps with this task. O&O ShutUp10 Focused on privacy settingsMust be installed: NoIcons after every setting warn you about possible risksShows you what exactly is changedConvenient search if you look for a specific settingDoNotSpy10 Focused on disabling services like Cortana, sensors, telemetry, and othersMust be installed: Yestraffic light coloring of settings indicates possible impact on the systemshows brief explanations for every settingfree download is ad-supportedW10Privacy Focused on privacy settings and all pre-installed appsMust be installed: NoMore detailed toggles, like just preventing OneDrive's sync feature instead of disabling/uninstalling it as a wholetraffic light coloring of every setting indicates possible impact on the systemhovering over a setting shows some info on what is done when toggledMaybe we should not ditch the OS but ditch the name: Microsoft Privacy Nightmare, or PN. Microsoft PN. Would really be a witty step after the last creative developer left Microsoft sometime after the Vista release. If you ask me, they instead hired devs who get an instant erection seeing so much data.... from just one Win10 installation.
-
Like some others here, I too have an issue on Windows where after "Checking route", the vpn client throws out the error from the title and doesn't connect to a server. I've played around with different settings while reading logs trying to see what causes it and it seems that for some reason either Windows or the vpn client dislike when both your default (ISP) network connection and the TAP (VPN) network connection have the same DNS settings. Fortunately, there's an easy workaround: 1) Make sure your default network connection's DNS are not one of AirVPN DNS servers (i.e. not 10.4.0.1). It can be either automatic or some of your other favorite DNS servers. 2) Check that the TAP network connection is set to automatic DNS servers (don't put any in manually). 3) In the 2.11 beta vpn client (I haven't tested on 2.10 stable) open Preferences (and click on "Reset to default settings" just in case) -> Advanced -> and then uncheck "Force all network interfaces for DNS". After that open the DNS settings tab just to make sure everything in there is set to default values (DNS Switch mode - Automatic, Check AirVPN DNS - yes, DNS Servers - blank). That's it. Now, there's one thing I'd like to mention. When doing all this I was worried that I would have a DNS leak because when I was using a different VPN service it would occasionally leak the DNS set in my default network connection's settings. However I've tested it out and there's no leak, and if you want to test it out for yourself I suggest using both ipleak and doileak, and for best results make sure you disconnect and reconnect several times to the same server and a few other servers in between tests, just to cover a wider ground. Feel free to ask questions or leave comments. P.S. As a general tip - I recommend you don't use your ISP's DNS settings for your default connection (unless you have to) cause there are some great uncensored and faster DNS servers out there. And as for the VPN DNS server I recommend you do stick with default AirVPN DNS servers cause it's useful having your IP and DNS address be the same.
-
I've been completely unable to get a reliable connection to AirVPN ever since I installed Windows 10. Typically it will connect, then appear to 'freeze up', then go through a cycle of multiple disconnect/reconnects ad infinitum. I think this issue actually originated earlier with Win7 but wasn't as frequently occurring. Sometimes it appears to work albeit erratically but as soon as I launch eMule - Bam! Data rates drop to a few 10s of bytes per second and shortly thereafter the disconnect/reconnect cycle begins. It used to be that removing the tap driver and allowing the client to reinstall it seemed to fix the issue for that one time connection (immediately after the reinstall), but now that doesn't even work reliably. About once in every 10 connection attempts I'll get a connection that works and stays stable. Linux connection seems OK, my next step will be to set up a Linux VM to use in the hope of getting some use out of the service.
-
Just installed the most recent Windows 10 update, been looking around the site but haven't found a definitive solution. I keep disconnecting as it is checking the route, I've tried unchecking "Check if the tunnel uses AirVPN DNS", but that results in a faulty connection. Logs: I 2016.12.06 23:38:00 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.12.06 23:38:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.12.06 23:38:00 - Data Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - App Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.12.06 23:38:00 - Command line arguments (0):. 2016.12.06 23:38:00 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.12.06 23:38:00 - Updating systems & servers data ...I 2016.12.06 23:38:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.12.06 23:38:00 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.12.06 23:38:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.12.06 23:38:00 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.12.06 23:38:00 - Ready. 2016.12.06 23:38:01 - Systems & servers data update completedI 2016.12.06 23:38:02 - Session starting.I 2016.12.06 23:38:02 - IPv6 disabled.I 2016.12.06 23:38:08 - Checking authorization ...! 2016.12.06 23:38:09 - Connecting to Cursa (United States, Miami). 2016.12.06 23:38:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:38:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:38:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:38:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:38:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link remote: [AF_INET]96.47.229.58:443. 2016.12.06 23:38:09 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.58:443, sid=66b5f82a a1377c50. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:38:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:38:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:38:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:38:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.58:443. 2016.12.06 23:38:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:38:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.21 255.255.0.0'. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:38:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:38:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:38:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:38:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:38:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.21/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:38:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.21/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:38:11 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:38:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - Starting Management Interface. 2016.12.06 23:38:16 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:38:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:38:16 - Flushing DNSI 2016.12.06 23:38:16 - Checking routeW 2016.12.06 23:38:40 - The remote name could not be resolved: 'cursa_exit.airservers.org'! 2016.12.06 23:38:40 - Disconnecting. 2016.12.06 23:38:40 - Management - Send 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:38:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:38:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:38:45 - Connection terminated.I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:38:48 - Cancel requested.I 2016.12.06 23:38:48 - IPv6 restored.! 2016.12.06 23:38:48 - Session terminated.I 2016.12.06 23:43:24 - Session starting.I 2016.12.06 23:43:24 - IPv6 disabled.I 2016.12.06 23:43:25 - Checking authorization ...! 2016.12.06 23:43:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:43:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:43:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:43:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:43:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:43:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:43:25 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=6c854023 923066a3. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Validating certificate key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:43:25 - OpenVPN > VERIFY KU OK. 2016.12.06 23:43:25 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:43:25 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:43:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:43:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:43:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:43:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:43:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:43:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:43:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:43:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:43:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:43:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:43:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - Starting Management Interface. 2016.12.06 23:43:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:43:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:43:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:43:33 - Flushing DNSI 2016.12.06 23:43:33 - Checking DNSW 2016.12.06 23:43:57 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:43:57 - Disconnecting. 2016.12.06 23:43:57 - Management - Send 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:43:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:44:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:44:02 - Connection terminated.I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:44:05 - Cancel requested.I 2016.12.06 23:44:05 - IPv6 restored.! 2016.12.06 23:44:05 - Session terminated.I 2016.12.06 23:50:11 - Session starting.I 2016.12.06 23:50:11 - IPv6 disabled.I 2016.12.06 23:50:11 - Checking authorization ...! 2016.12.06 23:50:11 - Connecting to Acamar (United States, Miami). 2016.12.06 23:50:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:50:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:50:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:50:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:50:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:50:11 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=b96b8d3e 113c910e. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:50:11 - OpenVPN > Validating certificate key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:50:11 - OpenVPN > VERIFY KU OK. 2016.12.06 23:50:11 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:50:11 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:50:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:50:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:50:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:50:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:50:14 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:50:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:50:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:50:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:50:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:50:14 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:50:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - Starting Management Interface. 2016.12.06 23:50:19 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:50:19 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:50:19 - Flushing DNSI 2016.12.06 23:50:19 - Checking DNSW 2016.12.06 23:50:43 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:50:44 - Disconnecting. 2016.12.06 23:50:44 - Management - Send 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:50:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:50:49 - Connection terminated.I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:50:49 - Cancel requested.I 2016.12.06 23:50:49 - IPv6 restored.! 2016.12.06 23:50:49 - Session terminated.I 2016.12.06 23:52:25 - Session starting.I 2016.12.06 23:52:25 - IPv6 disabled.I 2016.12.06 23:52:25 - Checking authorization ...! 2016.12.06 23:52:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:52:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:52:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:52:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=061a5617 c2c9cd1f. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Validating certificate key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:52:26 - OpenVPN > VERIFY KU OK. 2016.12.06 23:52:26 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:52:26 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:52:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:52:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:52:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:52:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:52:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:52:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - Starting Management Interface. 2016.12.06 23:52:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:52:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:52:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:52:33 - Flushing DNS! 2016.12.06 23:52:33 - Connected.. 2016.12.06 23:52:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:53:30 - Disconnecting. 2016.12.06 23:53:30 - Management - Send 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:53:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:53:35 - Connection terminated.I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:53:35 - IPv6 restored.! 2016.12.06 23:53:35 - Session terminated.I 2016.12.06 23:57:04 - Session starting.I 2016.12.06 23:57:04 - IPv6 disabled.I 2016.12.06 23:57:04 - Checking authorization ...! 2016.12.06 23:57:04 - Connecting to Acamar (United States, Miami). 2016.12.06 23:57:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:57:04 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=3144bc70 76c93ca4. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:05 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:05 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:05 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:57:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:07 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - Starting Management Interface. 2016.12.06 23:57:12 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:12 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:12 - Flushing DNS! 2016.12.06 23:57:12 - Connected.. 2016.12.06 23:57:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:57:36 - Disconnecting. 2016.12.06 23:57:36 - Management - Send 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:57:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:57:41 - Connection terminated.I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:57:44 - Checking authorization ...! 2016.12.06 23:57:44 - Connecting to Yildun (United States, Miami). 2016.12.06 23:57:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443. 2016.12.06 23:57:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2c89d04c abcce70e. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443. 2016.12.06 23:57:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.64 255.255.0.0'. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.64/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.64/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - Starting Management Interface. 2016.12.06 23:57:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:52 - Flushing DNS! 2016.12.06 23:57:52 - Connected.. 2016.12.06 23:57:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:58:03 - Disconnecting. 2016.12.06 23:58:03 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:08 - Connection terminated.I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:08 - IPv6 restored.! 2016.12.06 23:58:08 - Session terminated.I 2016.12.06 23:58:09 - Session starting.I 2016.12.06 23:58:09 - IPv6 disabled.I 2016.12.06 23:58:09 - Checking authorization ...! 2016.12.06 23:58:09 - Connecting to Acamar (United States, Miami). 2016.12.06 23:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=8e90e690 ea17a30b. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:58:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:58:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:58:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:58:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:58:12 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:58:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:58:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:58:12 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:58:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - Starting Management Interface. 2016.12.06 23:58:17 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:58:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:58:17 - Flushing DNS! 2016.12.06 23:58:17 - Connected.. 2016.12.06 23:58:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2016.12.06 23:58:32 - Disconnecting. 2016.12.06 23:58:32 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:37 - Connection terminated.I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:37 - IPv6 restored.! 2016.12.06 23:58:37 - Session terminated.I 2016.12.06 23:59:43 - Session starting.I 2016.12.06 23:59:43 - IPv6 disabled.I 2016.12.06 23:59:43 - Checking authorization ...! 2016.12.06 23:59:44 - Connecting to Acamar (United States, Miami). 2016.12.06 23:59:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:59:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:59:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:59:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:59:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=cdf0a51f fc693d36. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:59:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:59:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:59:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:59:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:59:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:59:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:59:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:59:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:59:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:59:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:59:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:59:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:59:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:59:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - Starting Management Interface. 2016.12.06 23:59:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:59:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:59:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:59:52 - Flushing DNS! 2016.12.06 23:59:52 - Connected.. 2016.12.06 23:59:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.07 00:00:12 - Disconnecting. 2016.12.07 00:00:12 - Management - Send 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > Closing TUN/TAP interface. 2016.12.07 00:00:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.07 00:00:17 - Connection terminated.I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.07 00:00:17 - IPv6 restored.! 2016.12.07 00:00:17 - Session terminated. If I could get some advice on how to fix this issue it would be much appreciated!