Search the Community
Showing results for tags 'connection failed'.
Found 3 results
-
ANSWERED Cannot connect to any server on eduroam
Floe posted a topic in Troubleshooting and Problems
I recently installed airVPN and Eddie client for Windows11. Everything works well when I use it while connected to my phone Access Point, but when I try to use it while connected to my school wifi (eduroam) it can't connect at all: it tries to connect for about 30 seconds, then times out and tries another (without success either)I I also use Eddie on my Android phone and it works fine, including on my school wifi. Do you know what is causing this problem? And how to fix it? Thank you Here are the logs I get on windows (for one connection trial): . 2024.08.19 19:01:17 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.08.19 19:01:17 - Command line arguments (1): path="home" . 2024.08.19 19:01:18 - Reading options from C:\Users\Aurélien\AppData\Local\Eddie\default.profile . 2024.08.19 19:01:20 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.08.19 19:01:20 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.08.19 19:01:20 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.08.19 19:01:21 - Ready . 2024.08.19 19:01:21 - Collect information about AirVPN completed I 2024.08.19 19:01:24 - Session starting. I 2024.08.19 19:01:25 - Checking authorization ... . 2024.08.19 19:01:27 - Added new network interface "Eddie", Wintun version 0.12 . 2024.08.19 19:01:27 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:01:27 - Connecting to Muscida (Netherlands, Alblasserdam) . 2024.08.19 19:01:27 - Routes, add 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:01:27 - Routes, add 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:01:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:01:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:01:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:01:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:01:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:01:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:01:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:01:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443 . 2024.08.19 19:01:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:01:27 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:01:27 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443 . 2024.08.19 19:01:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=0370627a 2fea8829 . 2024.08.19 19:01:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:01:27 - OpenVPN > VERIFY KU OK . 2024.08.19 19:01:27 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:01:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:01:27 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:01:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muscida, emailAddress=info@airvpn.org . 2024.08.19 19:01:59 - OpenVPN > [Muscida] Inactivity timeout (--ping-exit), exiting . 2024.08.19 19:01:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:02:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.08.19 19:02:05 - Disconnecting . 2024.08.19 19:02:05 - Routes, delete 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:05 - Routes, delete 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:02:05 - Connection terminated. I 2024.08.19 19:02:08 - Checking authorization ... . 2024.08.19 19:02:09 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:02:09 - Connecting to Alrai (Netherlands, Alblasserdam) . 2024.08.19 19:02:09 - Routes, add 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:09 - Routes, add 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:02:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:02:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:02:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:02:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.81:443 . 2024.08.19 19:02:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:02:09 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:02:09 - OpenVPN > UDP link remote: [AF_INET]213.152.162.81:443 . 2024.08.19 19:02:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.81:443, sid=40754da7 e4e67ebd . 2024.08.19 19:02:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:02:10 - OpenVPN > VERIFY KU OK . 2024.08.19 19:02:10 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:02:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:02:10 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:02:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alrai, emailAddress=info@airvpn.org . 2024.08.19 19:02:41 - OpenVPN > [Alrai] Inactivity timeout (--ping-exit), exiting . 2024.08.19 19:02:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:02:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.08.19 19:02:47 - Disconnecting . 2024.08.19 19:02:47 - Routes, delete 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:47 - Routes, delete 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:02:47 - Connection terminated. I 2024.08.19 19:02:50 - Checking authorization ... . 2024.08.19 19:02:51 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:02:51 - Connecting to Rukbat (Netherlands, Alblasserdam) . 2024.08.19 19:02:51 - Routes, add 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:51 - Routes, add 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:02:51 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:02:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:02:51 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:02:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.86:443 . 2024.08.19 19:02:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:02:51 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:02:51 - OpenVPN > UDP link remote: [AF_INET]213.152.162.86:443 . 2024.08.19 19:02:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.86:443, sid=24f9ee8a 314c9cd5 . 2024.08.19 19:02:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:02:51 - OpenVPN > VERIFY KU OK . 2024.08.19 19:02:51 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:02:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:02:51 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:02:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rukbat, emailAddress=info@airvpn.org ! 2024.08.19 19:03:14 - Disconnecting . 2024.08.19 19:03:14 - Sending soft termination signal . 2024.08.19 19:03:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:03:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.08.19 19:03:20 - Routes, delete 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:03:20 - Routes, delete 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:03:20 - Connection terminated. I 2024.08.19 19:03:20 - Cancel requested. ! 2024.08.19 19:03:21 - Session terminated. -
. 2019.02.09 14:20:39 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319 . 2019.02.09 14:20:39 - Reading options from D:\Programs\AirVPN\default.xml . 2019.02.09 14:20:39 - Command line arguments (0): . 2019.02.09 14:20:39 - Profile path: D:\Programs\AirVPN\default.xml . 2019.02.09 14:20:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 . 2019.02.09 14:20:40 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (D:\Programs\AirVPN\openvpn.exe) . 2019.02.09 14:20:40 - SSH - Version: plink 0.67 (D:\Programs\AirVPN\plink.exe) . 2019.02.09 14:20:40 - SSL - Version: stunnel 5.40 (D:\Programs\AirVPN\stunnel.exe) . 2019.02.09 14:20:40 - curl - Version: 7.54.1 (D:\Programs\AirVPN\curl.exe) . 2019.02.09 14:20:40 - Certification Authorities: D:\Programs\AirVPN\res\cacert.pem . 2019.02.09 14:20:41 - Updating systems & servers data ... I 2019.02.09 14:20:41 - Ready . 2019.02.09 14:20:42 - Systems & servers data update completed I 2019.02.09 14:20:49 - Session starting. I 2019.02.09 14:20:49 - Checking authorization ... . 2019.02.09 14:20:50 - IPv6 disabled with packet filtering. ! 2019.02.09 14:20:50 - Connecting to Sculptor (United States, Atlanta, Georgia) . 2019.02.09 14:20:50 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.02.09 14:20:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.02.09 14:20:50 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.02.09 14:20:50 - Connection to OpenVPN Management Interface . 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.02.09 14:20:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.02.09 14:20:50 - OpenVPN > UDP link local: (not bound) . 2019.02.09 14:20:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=4831c8cf c4c42820 . 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.02.09 14:20:50 - OpenVPN > VERIFY KU OK . 2019.02.09 14:20:50 - OpenVPN > Validating certificate extended key usage . 2019.02.09 14:20:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.02.09 14:20:50 - OpenVPN > VERIFY EKU OK . 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2019.02.09 14:20:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.02.09 14:20:50 - OpenVPN > [sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:51 - OpenVPN > SENT CONTROL [sculptor]: 'PUSH_REQUEST' (status=1) . 2019.02.09 14:20:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.90.1,dhcp-option DNS6 fde6:7a:7d20:135a::1,tun-ipv6,route-gateway 10.23.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1,ifconfig 10.23.90.187 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:135a::1' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1' . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.02.09 14:20:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.02.09 14:20:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.02.09 14:20:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.02.09 14:20:51 - OpenVPN > interactive service msg_channel=0 . 2019.02.09 14:20:51 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=e0:d5:5e:af:74:93 . 2019.02.09 14:20:51 - OpenVPN > open_tun . 2019.02.09 14:20:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2D318BED-776D-427C-94CD-FF14B83FB719}.tap . 2019.02.09 14:20:51 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.02.09 14:20:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.23.90.0/10.23.90.187/255.255.255.0 [sUCCEEDED] . 2019.02.09 14:20:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.23.90.187/255.255.255.0 on interface {2D318BED-776D-427C-94CD-FF14B83FB719} [DHCP-serv: 10.23.90.254, lease-time: 31536000] . 2019.02.09 14:20:51 - OpenVPN > Successful ARP Flush on interface [9] {2D318BED-776D-427C-94CD-FF14B83FB719} . 2019.02.09 14:20:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2019.02.09 14:20:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.42.179.37 MASK 255.255.255.255 192.168.1.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.23.90.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.23.90.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.02.09 14:20:56 - DNS leak protection with packet filtering enabled. . 2019.02.09 14:20:57 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.23.56.1) to 10.23.90.1) W 2019.02.09 14:20:57 - Routes, add 64.42.179.35 for gateway 10.23.90.1 failed: The screen cannot be set to the number of lines and columns specified . 2019.02.09 14:20:57 - Unable to compute route for 2605:9f80:6000:77:3824:245d:eb3b:b055: IPv6 VPN gateway not available. . 2019.02.09 14:20:57 - Flushing DNS I 2019.02.09 14:20:57 - Checking route IPv4 I 2019.02.09 14:20:57 - Checking DNS . 2019.02.09 14:21:09 - Checking DNS failed: . 2019.02.09 14:21:09 - Checking DNS (2° try) . 2019.02.09 14:21:23 - Checking DNS failed: . 2019.02.09 14:21:23 - Checking DNS (3° try)
-
Hi! I'm using Ubuntu Linux, when connecting via Network Manager GUI everything works ok. With airvpn_linux I'm unable to connect, here is the corresponding log, the relevant entry is "DNS checking failed" 10:40:39-valter@banana:~$ airvpn I 2015.02.18 10:40:55 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:40:55 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:40:55 - Profile options not found, using defaults. . 2015.02.18 10:40:55 - Restarting with admin privileges 10:40:55-valter@banana:~$ I 2015.02.18 10:41:00 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:41:00 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:41:00 - Profile options not found, using defaults. . 2015.02.18 10:41:00 - Data Path: /home/valter/.airvpn . 2015.02.18 10:41:00 - App Path: /usr/lib/AirVPN . 2015.02.18 10:41:00 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.02.18 10:41:00 - Command line arguments (1): path="/home/valter/.airvpn" . 2015.02.18 10:41:00 - Updating systems & servers data ... . 2015.02.18 10:41:00 - Operating System: Unix 3.18.0.13 - Linux banana 3.18.0-13-generic #14-Ubuntu SMP Fri Feb 6 09:55:14 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux I 2015.02.18 10:41:00 - OpenVPN Driver - Found I 2015.02.18 10:41:00 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.02.18 10:41:00 - SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.02.18 10:41:00 - SSL - Version: stunnel 5.06 (/usr/bin/stunnel4) I 2015.02.18 10:41:00 - IPV6: Available ! 2015.02.18 10:41:00 - Ready . 2015.02.18 10:41:01 - Systems & servers data update completed I 2015.02.18 10:41:30 - Checking login ... ! 2015.02.18 10:41:31 - Logged in. I 2015.02.18 10:41:39 - Session starting. I 2015.02.18 10:41:39 - Installing tunnel driver I 2015.02.18 10:41:39 - Checking authorization ... ! 2015.02.18 10:41:40 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:41:40 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:41:40 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:41:40 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:41:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=bf8d143c 9b723275 . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:41:45 - OpenVPN > Validating certificate key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:41:45 - OpenVPN > VERIFY KU OK . 2015.02.18 10:41:45 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:41:45 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:41:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:41:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:41:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:41:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:41:50 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:41:56 - Starting Management Interface . 2015.02.18 10:41:56 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:41:56 - Flushing DNS I 2015.02.18 10:41:56 - Checking route I 2015.02.18 10:41:57 - Checking DNS E 2015.02.18 10:41:57 - DNS checking failed. . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:41:57 - Disconnecting . 2015.02.18 10:41:57 - Management - Send 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:41:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:02 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:02 - Connection terminated. I 2015.02.18 10:42:05 - Checking authorization ... ! 2015.02.18 10:42:05 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:05 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:05 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:05 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:05 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=0f3fe417 8570eca2 . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:06 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:06 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:06 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:09 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:09 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:09 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:15 - Starting Management Interface . 2015.02.18 10:42:15 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:15 - Flushing DNS I 2015.02.18 10:42:15 - Checking route I 2015.02.18 10:42:15 - Checking DNS E 2015.02.18 10:42:15 - DNS checking failed. . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:15 - Disconnecting . 2015.02.18 10:42:15 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:20 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:20 - Connection terminated. I 2015.02.18 10:42:23 - Checking authorization ... ! 2015.02.18 10:42:23 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:23 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:23 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:23 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:23 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=9899d800 5a8b10e6 . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:24 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:24 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:24 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:24 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:29 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:29 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:35 - Starting Management Interface . 2015.02.18 10:42:35 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:35 - Flushing DNS I 2015.02.18 10:42:35 - Checking route I 2015.02.18 10:42:35 - Checking DNS E 2015.02.18 10:42:35 - DNS checking failed. . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:35 - Disconnecting . 2015.02.18 10:42:35 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:40 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:40 - Connection terminated. I 2015.02.18 10:42:40 - Cancel requested. ! 2015.02.18 10:42:40 - Session terminated. ^C Please help.... TIA