Jump to content
Not connected, Your IP: 34.201.121.213

Search the Community

Showing results for tags 'connection failed'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors
    • Net Neutrality Monitor

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 2 results

  1. . 2019.02.09 14:20:39 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319 . 2019.02.09 14:20:39 - Reading options from D:\Programs\AirVPN\default.xml . 2019.02.09 14:20:39 - Command line arguments (0): . 2019.02.09 14:20:39 - Profile path: D:\Programs\AirVPN\default.xml . 2019.02.09 14:20:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 . 2019.02.09 14:20:40 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (D:\Programs\AirVPN\openvpn.exe) . 2019.02.09 14:20:40 - SSH - Version: plink 0.67 (D:\Programs\AirVPN\plink.exe) . 2019.02.09 14:20:40 - SSL - Version: stunnel 5.40 (D:\Programs\AirVPN\stunnel.exe) . 2019.02.09 14:20:40 - curl - Version: 7.54.1 (D:\Programs\AirVPN\curl.exe) . 2019.02.09 14:20:40 - Certification Authorities: D:\Programs\AirVPN\res\cacert.pem . 2019.02.09 14:20:41 - Updating systems & servers data ... I 2019.02.09 14:20:41 - Ready . 2019.02.09 14:20:42 - Systems & servers data update completed I 2019.02.09 14:20:49 - Session starting. I 2019.02.09 14:20:49 - Checking authorization ... . 2019.02.09 14:20:50 - IPv6 disabled with packet filtering. ! 2019.02.09 14:20:50 - Connecting to Sculptor (United States, Atlanta, Georgia) . 2019.02.09 14:20:50 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.02.09 14:20:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.02.09 14:20:50 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.02.09 14:20:50 - Connection to OpenVPN Management Interface . 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.02.09 14:20:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.02.09 14:20:50 - OpenVPN > UDP link local: (not bound) . 2019.02.09 14:20:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=4831c8cf c4c42820 . 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.02.09 14:20:50 - OpenVPN > VERIFY KU OK . 2019.02.09 14:20:50 - OpenVPN > Validating certificate extended key usage . 2019.02.09 14:20:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.02.09 14:20:50 - OpenVPN > VERIFY EKU OK . 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2019.02.09 14:20:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.02.09 14:20:50 - OpenVPN > [sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2019.02.09 14:20:51 - OpenVPN > SENT CONTROL [sculptor]: 'PUSH_REQUEST' (status=1) . 2019.02.09 14:20:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.90.1,dhcp-option DNS6 fde6:7a:7d20:135a::1,tun-ipv6,route-gateway 10.23.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1,ifconfig 10.23.90.187 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:135a::1' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1' . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.02.09 14:20:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.02.09 14:20:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.02.09 14:20:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.02.09 14:20:51 - OpenVPN > interactive service msg_channel=0 . 2019.02.09 14:20:51 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=e0:d5:5e:af:74:93 . 2019.02.09 14:20:51 - OpenVPN > open_tun . 2019.02.09 14:20:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2D318BED-776D-427C-94CD-FF14B83FB719}.tap . 2019.02.09 14:20:51 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.02.09 14:20:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.23.90.0/10.23.90.187/255.255.255.0 [sUCCEEDED] . 2019.02.09 14:20:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.23.90.187/255.255.255.0 on interface {2D318BED-776D-427C-94CD-FF14B83FB719} [DHCP-serv: 10.23.90.254, lease-time: 31536000] . 2019.02.09 14:20:51 - OpenVPN > Successful ARP Flush on interface [9] {2D318BED-776D-427C-94CD-FF14B83FB719} . 2019.02.09 14:20:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2019.02.09 14:20:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.42.179.37 MASK 255.255.255.255 192.168.1.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.23.90.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.23.90.1 . 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.02.09 14:20:56 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.02.09 14:20:56 - DNS leak protection with packet filtering enabled. . 2019.02.09 14:20:57 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.23.56.1) to 10.23.90.1) W 2019.02.09 14:20:57 - Routes, add 64.42.179.35 for gateway 10.23.90.1 failed: The screen cannot be set to the number of lines and columns specified . 2019.02.09 14:20:57 - Unable to compute route for 2605:9f80:6000:77:3824:245d:eb3b:b055: IPv6 VPN gateway not available. . 2019.02.09 14:20:57 - Flushing DNS I 2019.02.09 14:20:57 - Checking route IPv4 I 2019.02.09 14:20:57 - Checking DNS . 2019.02.09 14:21:09 - Checking DNS failed: . 2019.02.09 14:21:09 - Checking DNS (2° try) . 2019.02.09 14:21:23 - Checking DNS failed: . 2019.02.09 14:21:23 - Checking DNS (3° try)
  2. Hi! I'm using Ubuntu Linux, when connecting via Network Manager GUI everything works ok. With airvpn_linux I'm unable to connect, here is the corresponding log, the relevant entry is "DNS checking failed" 10:40:39-valter@banana:~$ airvpn I 2015.02.18 10:40:55 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:40:55 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:40:55 - Profile options not found, using defaults. . 2015.02.18 10:40:55 - Restarting with admin privileges 10:40:55-valter@banana:~$ I 2015.02.18 10:41:00 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:41:00 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:41:00 - Profile options not found, using defaults. . 2015.02.18 10:41:00 - Data Path: /home/valter/.airvpn . 2015.02.18 10:41:00 - App Path: /usr/lib/AirVPN . 2015.02.18 10:41:00 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.02.18 10:41:00 - Command line arguments (1): path="/home/valter/.airvpn" . 2015.02.18 10:41:00 - Updating systems & servers data ... . 2015.02.18 10:41:00 - Operating System: Unix 3.18.0.13 - Linux banana 3.18.0-13-generic #14-Ubuntu SMP Fri Feb 6 09:55:14 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux I 2015.02.18 10:41:00 - OpenVPN Driver - Found I 2015.02.18 10:41:00 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.02.18 10:41:00 - SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.02.18 10:41:00 - SSL - Version: stunnel 5.06 (/usr/bin/stunnel4) I 2015.02.18 10:41:00 - IPV6: Available ! 2015.02.18 10:41:00 - Ready . 2015.02.18 10:41:01 - Systems & servers data update completed I 2015.02.18 10:41:30 - Checking login ... ! 2015.02.18 10:41:31 - Logged in. I 2015.02.18 10:41:39 - Session starting. I 2015.02.18 10:41:39 - Installing tunnel driver I 2015.02.18 10:41:39 - Checking authorization ... ! 2015.02.18 10:41:40 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:41:40 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:41:40 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:41:40 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:41:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=bf8d143c 9b723275 . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:41:45 - OpenVPN > Validating certificate key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:41:45 - OpenVPN > VERIFY KU OK . 2015.02.18 10:41:45 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:41:45 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:41:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:41:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:41:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:41:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:41:50 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:41:56 - Starting Management Interface . 2015.02.18 10:41:56 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:41:56 - Flushing DNS I 2015.02.18 10:41:56 - Checking route I 2015.02.18 10:41:57 - Checking DNS E 2015.02.18 10:41:57 - DNS checking failed. . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:41:57 - Disconnecting . 2015.02.18 10:41:57 - Management - Send 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:41:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:02 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:02 - Connection terminated. I 2015.02.18 10:42:05 - Checking authorization ... ! 2015.02.18 10:42:05 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:05 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:05 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:05 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:05 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=0f3fe417 8570eca2 . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:06 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:06 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:06 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:09 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:09 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:09 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:15 - Starting Management Interface . 2015.02.18 10:42:15 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:15 - Flushing DNS I 2015.02.18 10:42:15 - Checking route I 2015.02.18 10:42:15 - Checking DNS E 2015.02.18 10:42:15 - DNS checking failed. . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:15 - Disconnecting . 2015.02.18 10:42:15 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:20 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:20 - Connection terminated. I 2015.02.18 10:42:23 - Checking authorization ... ! 2015.02.18 10:42:23 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:23 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:23 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:23 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:23 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=9899d800 5a8b10e6 . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:24 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:24 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:24 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:24 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:29 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:29 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:35 - Starting Management Interface . 2015.02.18 10:42:35 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:35 - Flushing DNS I 2015.02.18 10:42:35 - Checking route I 2015.02.18 10:42:35 - Checking DNS E 2015.02.18 10:42:35 - DNS checking failed. . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:35 - Disconnecting . 2015.02.18 10:42:35 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:40 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:40 - Connection terminated. I 2015.02.18 10:42:40 - Cancel requested. ! 2015.02.18 10:42:40 - Session terminated. ^C Please help.... TIA
×
×
  • Create New...