Jump to content
Not connected, Your IP: 54.172.169.199

Search the Community

Showing results for tags 'disconnects'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 9 results

  1. Hi, I'm not quite sure if this is the right thread to address this particular issue since I managed to resolve the problem and I'm not entirely sure if it is relevant to anyone else but because it was a pretty annoying experience for me and I want to spare others from this happening to them I decided to share this anyway. I use AirVPN on three devices on mine. As I wanted to use the VPN on the go as well, I decided to use seperate clients and not one central client (like on the router). I generated VPN client configs according to my preferences on all three devices (I chose one country to use Servers from). For weeks I experienced unexplainable connection drops (no internet connection for several minutes) on my computers without any indication in the logs on what could be causing this. After this unpleasant experience and multiple attempts to fix this I finally was able to pinpoint the problem by chance. Apperently when connecting to the same vpn server from multiple devices in the same local network (and presumably when using UDP) the routing messed up and thus whenever my phone did its periodically checks on new messages my computer couldn't connect to the internet. After using different servers (countries) on my various devices everything worked like a charm. Is this expected behaviour? In my understanding the router should still be able to differentiate UDP traffic from various clients? And if this isn't the case, maybe during the config generation the user should be warned about using the same vpn servers on multiple devices. If this is indeed a bug and you need more information on my setup and/or more testing to be done (e.g. haven't tried using TCP or different ports yet. Was just happy that it was finally working properly with my current setup) please feel free to contact me.
  2. I am sorry I don't have more details, but perhaps the devs can tell me what to post to resolve the problem. For the past day or so, I am getting reconnects and disconnects, and ping times are way up. Also, AirVPN will list that the client is connected, but I have been getting no connection (e.g., can't view web pages). This is an intermittent problem, and switching servers fixes the problem, but then a few minutes later, the problem starts again. I am also getting Capatcha screens with many websites I visit (see attached image). I have been using AirVPN for many years now and I haven't changed any configuration settings since it worked last. I have attached my logs -- perhaps by looking at this you can help me figure out if the problem is AirVPN or my ISP? Eddie_20170607_090457.txt UPDATED Log 10:25am: Eddie_20170607_102438.txt UPDATED Log 2:04pm: It just happened again. Eddie_20170607_140159.txt Here is a copy of the latest log [in spoiler mode]: I 2017.06.07 11:05:30 - Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 6.3.9600.0, Mono/.Net Framework: v4.0.30319 . 2017.06.07 11:05:30 - Reading options from C:\Users\Sysop\AppData\Local\AirVPN\AirVPN.xml . 2017.06.07 11:05:31 - Data path: C:\Users\Sysop\AppData\Local\AirVPN . 2017.06.07 11:05:31 - Application path: C:\Program Files\AirVPN . 2017.06.07 11:05:31 - Executable path: C:\Program Files\AirVPN\AirVPN.exe . 2017.06.07 11:05:31 - Command line arguments (1): path="home" . 2017.06.07 11:05:31 - Operating System: Microsoft Windows NT 6.3.9600.0 I 2017.06.07 11:05:34 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2017.06.07 11:05:34 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe) I 2017.06.07 11:05:34 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2017.06.07 11:05:34 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2017.06.07 11:05:34 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe) I 2017.06.07 11:05:34 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2017.06.07 11:05:58 - Activation of Network Lock - Windows Filtering Platform . 2017.06.07 11:05:58 - Updating systems & servers data ... I 2017.06.07 11:05:58 - Session starting. . 2017.06.07 11:05:58 - IPv6 disabled with packet filtering. . 2017.06.07 11:06:02 - Systems & servers data update completed I 2017.06.07 11:06:02 - Checking authorization ... ! 2017.06.07 11:06:03 - Connecting to Sagittarius (United States, Atlanta, Georgia) . 2017.06.07 11:06:04 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.07 11:06:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.07 11:06:04 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.07 11:06:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.07 11:06:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 11:06:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 11:06:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]108.177.134.74:443 . 2017.06.07 11:06:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.07 11:06:04 - OpenVPN > UDP link local: (not bound) . 2017.06.07 11:06:04 - OpenVPN > UDP link remote: [AF_INET]108.177.134.74:443 . 2017.06.07 11:06:04 - OpenVPN > TLS: Initial packet from [AF_INET]108.177.134.74:443, sid=ee51eff0 bd51c3ef . 2017.06.07 11:06:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.07 11:06:04 - OpenVPN > Validating certificate key usage . 2017.06.07 11:06:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.07 11:06:04 - OpenVPN > VERIFY KU OK . 2017.06.07 11:06:04 - OpenVPN > Validating certificate extended key usage . 2017.06.07 11:06:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.07 11:06:04 - OpenVPN > VERIFY EKU OK . 2017.06.07 11:06:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sagittarius, emailAddress=info@airvpn.org . 2017.06.07 11:06:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.07 11:06:04 - OpenVPN > [sagittarius] Peer Connection Initiated with [AF_INET]108.177.134.74:443 . 2017.06.07 11:06:05 - OpenVPN > SENT CONTROL [sagittarius]: 'PUSH_REQUEST' (status=1) . 2017.06.07 11:06:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.140 255.255.0.0,peer-id 62,cipher AES-256-GCM' . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.07 11:06:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.07 11:06:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 11:06:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 11:06:05 - OpenVPN > interactive service msg_channel=0 . 2017.06.07 11:06:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=6 HWADDR=10:08:b1:3e:a1:1f . 2017.06.07 11:06:05 - OpenVPN > open_tun . 2017.06.07 11:06:06 - OpenVPN > TAP-WIN32 device [Ethernet 5] opened: \\.\Global\{55955DAC-B0A6-42C3-BF58-55A9BC9357BB}.tap . 2017.06.07 11:06:06 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.07 11:06:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.140/255.255.0.0 [sUCCEEDED] . 2017.06.07 11:06:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.140/255.255.0.0 on interface {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.07 11:06:06 - OpenVPN > Successful ARP Flush on interface [18] {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} . 2017.06.07 11:06:06 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.07 11:06:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.07 11:06:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 108.177.134.74 MASK 255.255.255.255 192.168.1.1 . 2017.06.07 11:06:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2017.06.07 11:06:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:06:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:06:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 11:06:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:06:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:06:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 11:06:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:06:10 - Starting Management Interface . 2017.06.07 11:06:10 - OpenVPN > Initialization Sequence Completed . 2017.06.07 11:06:11 - DNS leak protection with packet filtering enabled. . 2017.06.07 11:06:11 - Flushing DNS I 2017.06.07 11:06:19 - Checking route E 2017.06.07 11:07:00 - curl: (28) Connection timed out after 10047 milliseconds . 2017.06.07 11:07:00 - Checking route (2° try) E 2017.06.07 11:07:12 - curl: (28) Connection timed out after 10047 milliseconds . 2017.06.07 11:07:12 - Checking route (3° try) I 2017.06.07 11:07:15 - Checking DNS ! 2017.06.07 11:07:16 - Connected. . 2017.06.07 11:07:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.07 11:07:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #228 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:07:16 - Above log line repeated 1 times more . 2017.06.07 11:07:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.07 11:16:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #935 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:16:59 - Updating systems & servers data ... . 2017.06.07 11:17:16 - Systems & servers data update completed . 2017.06.07 11:17:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1545 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:27:38 - Above log line repeated 15 times more . 2017.06.07 11:27:38 - Updating systems & servers data ... . 2017.06.07 11:27:40 - Systems & servers data update completed . 2017.06.07 11:37:55 - Updating systems & servers data ... . 2017.06.07 11:37:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7311 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:37:56 - Systems & servers data update completed . 2017.06.07 11:38:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7334 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:48:13 - Above log line repeated 14 times more . 2017.06.07 11:48:13 - Updating systems & servers data ... . 2017.06.07 11:48:16 - Systems & servers data update completed . 2017.06.07 11:48:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #31227 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:52:17 - Above log line repeated 6 times more . 2017.06.07 11:52:17 - OpenVPN > [sagittarius] Inactivity timeout (--ping-restart), restarting . 2017.06.07 11:52:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.06.07 11:52:17 - OpenVPN > Restart pause, 5 second(s) ! 2017.06.07 11:52:17 - Disconnecting . 2017.06.07 11:52:17 - Management - Send 'signal SIGTERM' . 2017.06.07 11:52:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.07 11:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 108.177.134.74 MASK 255.255.255.255 192.168.1.1 . 2017.06.07 11:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 11:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 11:52:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:52:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 11:52:17 - OpenVPN > Closing TUN/TAP interface . 2017.06.07 11:52:17 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2017.06.07 11:52:17 - Connection terminated. . 2017.06.07 11:52:17 - DNS leak protection with packet filtering disabled. I 2017.06.07 11:52:25 - Checking authorization ... ! 2017.06.07 11:52:26 - Connecting to Octans (United States, Atlanta, Georgia) . 2017.06.07 11:52:26 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.07 11:52:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.07 11:52:26 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.07 11:52:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.07 11:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 11:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 11:52:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]108.62.228.186:443 . 2017.06.07 11:52:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.07 11:52:26 - OpenVPN > UDP link local: (not bound) . 2017.06.07 11:52:26 - OpenVPN > UDP link remote: [AF_INET]108.62.228.186:443 . 2017.06.07 11:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]108.62.228.186:443, sid=e4d52dc9 f32130c0 . 2017.06.07 11:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.07 11:52:26 - OpenVPN > Validating certificate key usage . 2017.06.07 11:52:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.07 11:52:26 - OpenVPN > VERIFY KU OK . 2017.06.07 11:52:26 - OpenVPN > Validating certificate extended key usage . 2017.06.07 11:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.07 11:52:26 - OpenVPN > VERIFY EKU OK . 2017.06.07 11:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Octans, emailAddress=info@airvpn.org . 2017.06.07 11:52:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.07 11:52:27 - OpenVPN > [Octans] Peer Connection Initiated with [AF_INET]108.62.228.186:443 . 2017.06.07 11:52:28 - OpenVPN > SENT CONTROL [Octans]: 'PUSH_REQUEST' (status=1) . 2017.06.07 11:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.54 255.255.0.0,peer-id 34,cipher AES-256-GCM' . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.06.07 11:52:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.06.07 11:52:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 11:52:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 11:52:28 - OpenVPN > interactive service msg_channel=0 . 2017.06.07 11:52:28 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=6 HWADDR=10:08:b1:3e:a1:1f . 2017.06.07 11:52:28 - OpenVPN > open_tun . 2017.06.07 11:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 5] opened: \\.\Global\{55955DAC-B0A6-42C3-BF58-55A9BC9357BB}.tap . 2017.06.07 11:52:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.07 11:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.54/255.255.0.0 [sUCCEEDED] . 2017.06.07 11:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.54/255.255.0.0 on interface {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.07 11:52:28 - OpenVPN > Successful ARP Flush on interface [18] {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} . 2017.06.07 11:52:28 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.07 11:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.07 11:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 108.62.228.186 MASK 255.255.255.255 192.168.1.1 . 2017.06.07 11:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2017.06.07 11:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 11:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 11:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 11:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 11:52:33 - Starting Management Interface . 2017.06.07 11:52:33 - OpenVPN > Initialization Sequence Completed . 2017.06.07 11:52:33 - DNS leak protection with packet filtering enabled. . 2017.06.07 11:52:33 - Flushing DNS I 2017.06.07 11:52:37 - Checking route I 2017.06.07 11:52:38 - Checking DNS ! 2017.06.07 11:52:39 - Connected. . 2017.06.07 11:52:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.07 11:52:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.07 11:52:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #998 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 11:58:31 - Above log line repeated 13 times more . 2017.06.07 11:58:31 - Updating systems & servers data ... . 2017.06.07 11:58:34 - Systems & servers data update completed . 2017.06.07 11:58:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7060 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:08:48 - Above log line repeated 14 times more . 2017.06.07 12:08:48 - Updating systems & servers data ... . 2017.06.07 12:09:00 - Systems & servers data update completed . 2017.06.07 12:09:05 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #11657 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:19:13 - Above log line repeated 14 times more . 2017.06.07 12:19:13 - Updating systems & servers data ... . 2017.06.07 12:19:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #13053 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:19:14 - Systems & servers data update completed . 2017.06.07 12:19:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #13178 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:29:28 - Above log line repeated 3 times more . 2017.06.07 12:29:28 - Updating systems & servers data ... . 2017.06.07 12:29:29 - Systems & servers data update completed . 2017.06.07 12:29:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15082 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:39:39 - Above log line repeated 8 times more . 2017.06.07 12:39:39 - Updating systems & servers data ... . 2017.06.07 12:39:41 - Systems & servers data update completed . 2017.06.07 12:39:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15945 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:49:43 - Above log line repeated 8 times more . 2017.06.07 12:49:43 - Updating systems & servers data ... . 2017.06.07 12:49:45 - Systems & servers data update completed . 2017.06.07 12:49:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #18648 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:52:27 - Above log line repeated 1 times more . 2017.06.07 12:52:27 - OpenVPN > TLS: soft reset sec=0 bytes=13830482/-1 pkts=34463/0 . 2017.06.07 12:52:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.07 12:52:27 - OpenVPN > Validating certificate key usage . 2017.06.07 12:52:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.07 12:52:27 - OpenVPN > VERIFY KU OK . 2017.06.07 12:52:27 - OpenVPN > Validating certificate extended key usage . 2017.06.07 12:52:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.07 12:52:27 - OpenVPN > VERIFY EKU OK . 2017.06.07 12:52:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Octans, emailAddress=info@airvpn.org . 2017.06.07 12:52:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 12:52:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 12:52:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.07 12:56:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #155 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 12:59:47 - Updating systems & servers data ... . 2017.06.07 12:59:49 - Systems & servers data update completed . 2017.06.07 12:59:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #430 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:09:51 - Above log line repeated 8 times more . 2017.06.07 13:09:51 - Updating systems & servers data ... . 2017.06.07 13:09:53 - Systems & servers data update completed . 2017.06.07 13:10:25 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9882 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:19:56 - Above log line repeated 12 times more . 2017.06.07 13:19:56 - Updating systems & servers data ... . 2017.06.07 13:19:57 - Systems & servers data update completed . 2017.06.07 13:20:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #40525 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:30:00 - Above log line repeated 32 times more . 2017.06.07 13:30:00 - Updating systems & servers data ... . 2017.06.07 13:30:12 - Systems & servers data update completed . 2017.06.07 13:30:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #43889 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:40:15 - Above log line repeated 9 times more . 2017.06.07 13:40:15 - Updating systems & servers data ... . 2017.06.07 13:40:16 - Systems & servers data update completed . 2017.06.07 13:40:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #46747 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:50:19 - Above log line repeated 24 times more . 2017.06.07 13:50:19 - Updating systems & servers data ... . 2017.06.07 13:50:24 - Systems & servers data update completed . 2017.06.07 13:50:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #50054 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:52:27 - Above log line repeated 3 times more . 2017.06.07 13:52:27 - OpenVPN > TLS: soft reset sec=0 bytes=60526036/-1 pkts=98548/0 . 2017.06.07 13:52:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.07 13:52:27 - OpenVPN > Validating certificate key usage . 2017.06.07 13:52:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.07 13:52:27 - OpenVPN > VERIFY KU OK . 2017.06.07 13:52:27 - OpenVPN > Validating certificate extended key usage . 2017.06.07 13:52:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.07 13:52:27 - OpenVPN > VERIFY EKU OK . 2017.06.07 13:52:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Octans, emailAddress=info@airvpn.org . 2017.06.07 13:52:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 13:52:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.06.07 13:52:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.07 13:52:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #50609 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 13:55:09 - Above log line repeated 1 times more . 2017.06.07 13:55:09 - OpenVPN > [Octans] Inactivity timeout (--ping-restart), restarting . 2017.06.07 13:55:09 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.06.07 13:55:09 - OpenVPN > Restart pause, 5 second(s) ! 2017.06.07 13:55:09 - Disconnecting . 2017.06.07 13:55:09 - Management - Send 'signal SIGTERM' . 2017.06.07 13:55:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.06.07 13:55:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 108.62.228.186 MASK 255.255.255.255 192.168.1.1 . 2017.06.07 13:55:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 13:55:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 13:55:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 13:55:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 13:55:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.06.07 13:55:09 - OpenVPN > Closing TUN/TAP interface . 2017.06.07 13:55:09 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2017.06.07 13:55:09 - Connection terminated. . 2017.06.07 13:55:09 - DNS leak protection with packet filtering disabled. I 2017.06.07 13:55:16 - Checking authorization ... ! 2017.06.07 13:55:17 - Connecting to Alsafi (United States, Dallas, Texas) . 2017.06.07 13:55:17 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2017.06.07 13:55:17 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.06.07 13:55:17 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2017.06.07 13:55:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.06.07 13:55:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 13:55:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 13:55:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.183.238.194:443 . 2017.06.07 13:55:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.06.07 13:55:17 - OpenVPN > UDP link local: (not bound) . 2017.06.07 13:55:17 - OpenVPN > UDP link remote: [AF_INET]107.183.238.194:443 . 2017.06.07 13:55:17 - OpenVPN > TLS: Initial packet from [AF_INET]107.183.238.194:443, sid=0cf8117d 82a8e753 . 2017.06.07 13:55:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.06.07 13:55:17 - OpenVPN > Validating certificate key usage . 2017.06.07 13:55:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.06.07 13:55:17 - OpenVPN > VERIFY KU OK . 2017.06.07 13:55:17 - OpenVPN > Validating certificate extended key usage . 2017.06.07 13:55:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.06.07 13:55:17 - OpenVPN > VERIFY EKU OK . 2017.06.07 13:55:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.06.07 13:55:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.06.07 13:55:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]107.183.238.194:443 . 2017.06.07 13:55:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.06.07 13:55:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.16 255.255.0.0' . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.06.07 13:55:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.06.07 13:55:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.07 13:55:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 13:55:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.06.07 13:55:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.06.07 13:55:19 - OpenVPN > interactive service msg_channel=0 . 2017.06.07 13:55:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=6 HWADDR=10:08:b1:3e:a1:1f . 2017.06.07 13:55:19 - OpenVPN > open_tun . 2017.06.07 13:55:19 - OpenVPN > TAP-WIN32 device [Ethernet 5] opened: \\.\Global\{55955DAC-B0A6-42C3-BF58-55A9BC9357BB}.tap . 2017.06.07 13:55:19 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.06.07 13:55:19 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.16/255.255.0.0 [sUCCEEDED] . 2017.06.07 13:55:19 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.16/255.255.0.0 on interface {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.06.07 13:55:19 - OpenVPN > Successful ARP Flush on interface [18] {55955DAC-B0A6-42C3-BF58-55A9BC9357BB} . 2017.06.07 13:55:19 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.06.07 13:55:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.06.07 13:55:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 107.183.238.194 MASK 255.255.255.255 192.168.1.1 . 2017.06.07 13:55:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2017.06.07 13:55:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 13:55:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 13:55:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 13:55:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 13:55:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.06.07 13:55:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2017.06.07 13:55:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.06.07 13:55:24 - Starting Management Interface . 2017.06.07 13:55:24 - OpenVPN > Initialization Sequence Completed . 2017.06.07 13:55:24 - DNS leak protection with packet filtering enabled. . 2017.06.07 13:55:24 - Flushing DNS I 2017.06.07 13:55:28 - Checking route I 2017.06.07 13:55:29 - Checking DNS ! 2017.06.07 13:55:30 - Connected. . 2017.06.07 13:55:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.06.07 13:55:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.06.07 13:55:30 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #136 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2017.06.07 14:00:27 - Updating systems & servers data ... . 2017.06.07 14:01:09 - Cannot retrieve systems & servers data. (curl: (28) Connection timed out after 10047 milliseconds) Seeing a lot of this: AEAD Decrypt error: bad packet ID Thanks. JpD.
  3. NOTE FROM STAFF: THIS TOPIC IS NOW OBSOLETE. PREFER TUN/TAP DRIVER VERSION 9.21.2 INCLUDED IN EDDIE 2.11 AND HIGHER VERSIONS. Hi there, I'll be writing this hastily as I've spent about 6 hours diagnosing this issue. I'll revisit it later to add details if need be. TL;DR: The latest TAP Windows Driver (9.21.0) is causing odd behavior when transferring data. Rolling the TAP driver back to (9.9.1) solved all my connection issues with the AirVPN client, my torrents and general web traffic. THE ISSUE: My torrent client would download/upload files correctly most of the time. Speed fluctuations are obviously normal, however I noticed a pattern where requesting ANY downstream data would essentially crash my torrents (bring them to 0 kb/s), then would skyrocket them back up to normal downloading speeds. I can reproduce this issue on the fly. DESCRIPTION 1. Let's say I'm torrenting. Downloading at 1mb (or MB, I forget) per second. 2. Open Chrome, go to YouTube and watch any random video (or any webpage for that matter.) 3. Observe torrents nosedive to 0kb/s. At the same time, Chrome would constantly either crash or give a DNS error. 4. After about 5-15 seconds my torrents would start downloading/uploading correctly, while the YouTube video loads up correctly as well. 5. After the video buffers and requires more data to continue playing, the pattern repeats. This was obviously a very annoying issue and one that almost made me request a refund for my AirVPN subscription. The torrents consistently nosedive to 0kb/s, and then rocket back to normal speeds when the competing data was requested/transferred. I need to stress, that this is NOT limited to torrents or YouTube. It seems that any combination of (consistent transfers vs. a new transfer request) was enough to replicate this issue. In other words, I was able to replicate the issue by browsing Facebook, while downloading a patch for a game on Steam. DIAGNOSIS: 1. Event viewer showed countless DNS errors (ERROR: The Peer Name Resolution Protocol service terminated with the following error: %%-2140993535) -> This was fixed by enabling the Peer Networking Group services inside services.msc. I may have disabled this months ago in hopes of streamlining my processes. This had no effect on fixing my main issue. However, it's nice to have less errors. 2. Incorrect usage of 1500 MTU. This one I suspected, but am still unsure if it caused any issues to begin with. I have since set a MTU of 1200 (until I have more time to test by xx10 values). 3. Basic malware testing / constant network resets and re-installing TAP and Wireless adapter drivers...this is where it gets interesting. After hours of constant testing, I narrowed the main problem down to the TAP wireless adapter driver version that the AirVPN client is using. The current client is using (tap-windows-9.21.0 - May 2014) which technically is the most up-to-date driver. However, the previous driver (tap-windows-9.9.1) DOES NOT PRODUCE THIS ISSUE! SOLUTION:Roll-back the TAP driver to 9.9.1 (tap-windows-9.9.1.exe) using the executable from this page: http://swupdate.openvpn.org/community/releases/ 1. Within AirVPN settings, make sure that inside (preferences -> advanced -> general -> Microsoft Windows Only (on the right) that [Disable driver upgrade] is disabled. Otherwise, the AirVPN client will always update the TAP Windows driver to 9.21.0 upon launch. Be diligent in checking the forums for when a new TAP Windows driver is provided by OpenVPN, which will hopefully fix this issue! I'm sure that being on an older TAP Windows driver for an extended time may not be the most security-conscious decision, however I couldn't deal with the connection issues anymore. 2. Uninstall the current TAP driver (I used Device Manager ->Network Adapters -> TAP-Windows-Adapter-> Right-click and uninstall [and delete driver software].) 3. Download and install the older driver (9.9.1). From the link provided above. 4. Run the AirVPN client 5. Verify that any disconnects / drops / speed issues are resolved. If not, your issue may be less complicated than this and will require more troubleshooting. However, I will say that after scouring 10-20 threads on my issues, rolling back the TAP Windows driver helps. THOUGHTS / NOTES: The crazy thing is that I actually experienced THIS EXACT ISSUE while I was on PIA (another VPN) before moving to AirVPN. I chalked it to maybe a declining quality of service but they are probably using the 9.21.0 TAP Windows driver as well (the behavior I experienced was literally the same.) It seems that OpenVPN are aware of the quirks involving the 9.21.0 driver, so here's hoping that they're working on an update soon. Of course, this advice is at your own risk. I just wanted to share my experience after literally 5-6 hair-pulling hours trying to debug this issue. As I write this post my traffic has been uninterrupted while watching some soccer videos on YouTube. Please let me know if I can help any further! From other threads that I saw, this is a widespread issue. Many people are experiencing some sort of disconnect / dropouts / slow transfer speeds or in general weird behavior with unexplained causes. For me, the most recent 9.21.0 TAP driver was the cause. I still love you, AirVPN.
  4. Dear readers, I have recently purchased a three month subscription to AirVPN and I've been using it over the past four or so days. I am having constant issues with regards to extreme jitter, occasional connection drops, and large amounts of packet loss. I have in the corner of my second monitor a (rainmeter) network meter (see first attachment). It measures my up- and downstream as well as my latency to 62.40.106.135, a perfSONAR address meant for testing latency. It tests every second. Symptoms: - Latency jitter ranges from ~20 to ~20000 milliseconds. - Occasional disconnects (latency stuck on 30000 and everything times out) - Some packet loss (often coincides with latency spikes) - Bandwidth trouble (often coincides with latency spikes and disconnects, remains for a minute or so after reconnecting) What I've tried: - Switching servers: I've tried 2 in Alblasserdam, 1 in Manchester and 1 in Germany (unsure where exactly) - Using specific protocols (top three, UDP 443, TCP 443 and UDP 80) - Increased send and receive buffer sizes to 256 and even 512 KB Background and specifications: - I am located in the Netherlands and my ISP is Ziggo (previously UPC, they merged). My subscription with them is good for 40 mb/s down and 4 mb/s up. Despite the price they ask for this I have had no trouble with their service whatsoever. - See second attachment for specifications of my computer. - See third attachment for specifications and settings of my network. - See fourth attachment for my Eddie settings. I have left out the parts I have not edited myself and are most unlikely to contain relevant settings. - See inside spoiler below for log. I have skimmed through it myself a few times over the past few days but I haven't been able to find anything. . 2017.04.27 05:29:37 - Systems & servers data update completed. 2017.04.27 05:29:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2276173 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:35:37 - Above log line repeated 105 times more. 2017.04.27 05:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 05:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 05:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 05:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 05:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 05:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 05:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 05:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 05:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 05:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 05:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 05:36:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2507723 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:39:38 - Above log line repeated 68 times more. 2017.04.27 05:39:38 - Updating systems & servers data .... 2017.04.27 05:39:38 - Systems & servers data update completed. 2017.04.27 05:39:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #127983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:49:38 - Above log line repeated 176 times more. 2017.04.27 05:49:38 - Updating systems & servers data .... 2017.04.27 05:49:39 - Systems & servers data update completed. 2017.04.27 05:49:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #566035 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:59:39 - Above log line repeated 159 times more. 2017.04.27 05:59:39 - Updating systems & servers data .... 2017.04.27 05:59:42 - Systems & servers data update completed. 2017.04.27 05:59:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #970788 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:09:42 - Above log line repeated 99 times more. 2017.04.27 06:09:42 - Updating systems & servers data .... 2017.04.27 06:09:43 - Systems & servers data update completed. 2017.04.27 06:09:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1393141 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:19:43 - Above log line repeated 173 times more. 2017.04.27 06:19:43 - Updating systems & servers data .... 2017.04.27 06:19:43 - Systems & servers data update completed. 2017.04.27 06:20:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1839699 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:29:43 - Above log line repeated 133 times more. 2017.04.27 06:29:43 - Updating systems & servers data .... 2017.04.27 06:29:44 - Systems & servers data update completed. 2017.04.27 06:29:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2262473 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:35:37 - Above log line repeated 47 times more. 2017.04.27 06:35:37 - OpenVPN > TLS: soft reset sec=0 bytes=3591490463/-1 pkts=3835628/0. 2017.04.27 06:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 06:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 06:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 06:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 06:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 06:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 06:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 06:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 06:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 06:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 06:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 06:35:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2416729 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:39:45 - Above log line repeated 43 times more. 2017.04.27 06:39:45 - Updating systems & servers data .... 2017.04.27 06:39:45 - Systems & servers data update completed. 2017.04.27 06:40:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #55454 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:49:45 - Above log line repeated 94 times more. 2017.04.27 06:49:45 - Updating systems & servers data .... 2017.04.27 06:49:46 - Systems & servers data update completed. 2017.04.27 06:49:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #212178 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:59:46 - Above log line repeated 47 times more. 2017.04.27 06:59:46 - Updating systems & servers data .... 2017.04.27 06:59:48 - Systems & servers data update completed. 2017.04.27 07:00:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #409020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:09:48 - Above log line repeated 82 times more. 2017.04.27 07:09:48 - Updating systems & servers data .... 2017.04.27 07:09:50 - Systems & servers data update completed. 2017.04.27 07:10:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #565707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:19:50 - Above log line repeated 65 times more. 2017.04.27 07:19:51 - Updating systems & servers data .... 2017.04.27 07:19:53 - Systems & servers data update completed. 2017.04.27 07:20:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #767381 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:29:53 - Above log line repeated 121 times more. 2017.04.27 07:29:53 - Updating systems & servers data .... 2017.04.27 07:29:57 - Systems & servers data update completed. 2017.04.27 07:30:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1031568 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:35:37 - Above log line repeated 89 times more. 2017.04.27 07:35:37 - OpenVPN > TLS: soft reset sec=0 bytes=2050828597/-1 pkts=2553401/0. 2017.04.27 07:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 07:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 07:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 07:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 07:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 07:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 07:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 07:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 07:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 07:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 07:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 07:36:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1268561 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:39:57 - Above log line repeated 73 times more. 2017.04.27 07:39:57 - Updating systems & servers data .... 2017.04.27 07:39:58 - Systems & servers data update completed. 2017.04.27 07:40:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #136395 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:49:58 - Above log line repeated 172 times more. 2017.04.27 07:49:58 - Updating systems & servers data .... 2017.04.27 07:49:59 - Systems & servers data update completed. 2017.04.27 07:51:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #423569 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:00:59 - Above log line repeated 79 times more. 2017.04.27 08:00:59 - Updating systems & servers data .... 2017.04.27 08:01:00 - Systems & servers data update completed. 2017.04.27 08:01:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #632108 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:11:00 - Above log line repeated 95 times more. 2017.04.27 08:11:00 - Updating systems & servers data .... 2017.04.27 08:11:01 - Systems & servers data update completed. 2017.04.27 08:11:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #833303 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:21:01 - Above log line repeated 82 times more. 2017.04.27 08:21:01 - Updating systems & servers data .... 2017.04.27 08:21:04 - Systems & servers data update completed. 2017.04.27 08:21:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1043880 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:31:04 - Above log line repeated 152 times more. 2017.04.27 08:31:04 - Updating systems & servers data .... 2017.04.27 08:31:06 - Systems & servers data update completed. 2017.04.27 08:31:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1225094 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:35:37 - Above log line repeated 55 times moreI 2017.04.27 08:35:37 - Renewing TLS key. 2017.04.27 08:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 08:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=2083452371/-1 pkts=2632045/0. 2017.04.27 08:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 08:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 08:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 08:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 08:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 08:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 08:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 08:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 08:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 08:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 08:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 08:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1291027 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:41:06 - Above log line repeated 31 times more. 2017.04.27 08:41:06 - Updating systems & servers data .... 2017.04.27 08:41:07 - Systems & servers data update completed. 2017.04.27 08:41:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77449 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:51:07 - Above log line repeated 85 times more. 2017.04.27 08:51:07 - Updating systems & servers data .... 2017.04.27 08:51:08 - Systems & servers data update completed. 2017.04.27 08:51:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #241065 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:01:08 - Above log line repeated 108 times more. 2017.04.27 09:01:08 - Updating systems & servers data .... 2017.04.27 09:01:11 - Systems & servers data update completed. 2017.04.27 09:01:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #400156 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:11:11 - Above log line repeated 101 times more. 2017.04.27 09:11:11 - Updating systems & servers data .... 2017.04.27 09:11:12 - Systems & servers data update completed. 2017.04.27 09:11:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #570869 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:21:12 - Above log line repeated 68 times more. 2017.04.27 09:21:12 - Updating systems & servers data .... 2017.04.27 09:21:13 - Systems & servers data update completed. 2017.04.27 09:21:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #737520 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:31:13 - Above log line repeated 167 times more. 2017.04.27 09:31:13 - Updating systems & servers data .... 2017.04.27 09:31:13 - Systems & servers data update completed. 2017.04.27 09:31:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #924825 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:35:38 - Above log line repeated 86 times moreI 2017.04.27 09:35:38 - Renewing TLS key. 2017.04.27 09:35:38 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 09:35:39 - OpenVPN > TLS: soft reset sec=0 bytes=1822007608/-1 pkts=2185273/0. 2017.04.27 09:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 09:35:39 - OpenVPN > Validating certificate key usage. 2017.04.27 09:35:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 09:35:39 - OpenVPN > VERIFY KU OK. 2017.04.27 09:35:39 - OpenVPN > Validating certificate extended key usage. 2017.04.27 09:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 09:35:39 - OpenVPN > VERIFY EKU OK. 2017.04.27 09:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 09:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 09:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 09:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 09:36:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1003521 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:41:13 - Above log line repeated 84 times more. 2017.04.27 09:41:13 - Updating systems & servers data .... 2017.04.27 09:41:14 - Systems & servers data update completed. 2017.04.27 09:41:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77111 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:52:14 - Above log line repeated 101 times more. 2017.04.27 09:52:14 - Updating systems & servers data .... 2017.04.27 09:52:15 - Systems & servers data update completed. 2017.04.27 09:52:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #276736 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:02:15 - Above log line repeated 85 times more. 2017.04.27 10:02:15 - Updating systems & servers data .... 2017.04.27 10:02:16 - Systems & servers data update completed. 2017.04.27 10:02:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #441301 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:13:16 - Above log line repeated 82 times more. 2017.04.27 10:13:16 - Updating systems & servers data .... 2017.04.27 10:13:17 - Systems & servers data update completed. 2017.04.27 10:13:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #621012 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:23:17 - Above log line repeated 61 times more. 2017.04.27 10:23:17 - Updating systems & servers data .... 2017.04.27 10:23:18 - Systems & servers data update completed. 2017.04.27 10:24:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #806524 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:33:18 - Above log line repeated 96 times more. 2017.04.27 10:33:18 - Updating systems & servers data .... 2017.04.27 10:33:19 - Systems & servers data update completed. 2017.04.27 10:33:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #963534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:35:38 - Above log line repeated 15 times more. 2017.04.27 10:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 10:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 10:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 10:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 10:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 10:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 10:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 10:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 10:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 10:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 10:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 10:36:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1005198 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:43:19 - Above log line repeated 65 times more. 2017.04.27 10:43:19 - Updating systems & servers data .... 2017.04.27 10:43:20 - Systems & servers data update completed. 2017.04.27 10:44:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #130275 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:53:20 - Above log line repeated 95 times more. 2017.04.27 10:53:20 - Updating systems & servers data .... 2017.04.27 10:53:21 - Systems & servers data update completed. 2017.04.27 10:53:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #275681 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:04:21 - Above log line repeated 45 times more. 2017.04.27 11:04:21 - Updating systems & servers data .... 2017.04.27 11:04:21 - Systems & servers data update completed. 2017.04.27 11:04:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #381983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:14:21 - Above log line repeated 47 times more. 2017.04.27 11:14:21 - Updating systems & servers data .... 2017.04.27 11:14:22 - Systems & servers data update completed. 2017.04.27 11:15:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #453609 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:24:22 - Above log line repeated 97 times more. 2017.04.27 11:24:22 - Updating systems & servers data .... 2017.04.27 11:24:23 - Systems & servers data update completed. 2017.04.27 11:24:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #575893 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:34:23 - Above log line repeated 77 times more. 2017.04.27 11:34:23 - Updating systems & servers data .... 2017.04.27 11:34:24 - Systems & servers data update completed. 2017.04.27 11:34:58 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #730610 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:35:38 - Above log line repeated 20 times more. 2017.04.27 11:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=1313761859/-1 pkts=1693408/0. 2017.04.27 11:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 11:35:39 - OpenVPN > Validating certificate key usage. 2017.04.27 11:35:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 11:35:39 - OpenVPN > VERIFY KU OK. 2017.04.27 11:35:39 - OpenVPN > Validating certificate extended key usage. 2017.04.27 11:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 11:35:39 - OpenVPN > VERIFY EKU OK. 2017.04.27 11:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 11:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 11:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 11:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 11:36:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #747644 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:44:24 - Above log line repeated 76 times more. 2017.04.27 11:44:24 - Updating systems & servers data .... 2017.04.27 11:44:25 - Systems & servers data update completed. 2017.04.27 11:45:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #108965 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:54:25 - Above log line repeated 24 times more. 2017.04.27 11:54:25 - Updating systems & servers data .... 2017.04.27 11:54:26 - Systems & servers data update completed. 2017.04.27 11:55:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #196542 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:04:26 - Above log line repeated 53 times more. 2017.04.27 12:04:26 - Updating systems & servers data .... 2017.04.27 12:04:27 - Systems & servers data update completed. 2017.04.27 12:06:04 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #320944 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:15:27 - Above log line repeated 65 times more. 2017.04.27 12:15:27 - Updating systems & servers data .... 2017.04.27 12:15:27 - Systems & servers data update completed. 2017.04.27 12:15:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #445585 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:25:28 - Above log line repeated 52 times more. 2017.04.27 12:25:28 - Updating systems & servers data .... 2017.04.27 12:25:28 - Systems & servers data update completed. 2017.04.27 12:26:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #569672 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:35:28 - Above log line repeated 91 times more. 2017.04.27 12:35:28 - Updating systems & servers data .... 2017.04.27 12:35:30 - Systems & servers data update completedI 2017.04.27 12:35:38 - Renewing TLS key. 2017.04.27 12:35:38 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 12:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 12:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 12:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 12:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 12:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 12:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 12:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 12:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 12:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 12:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 12:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 12:35:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #699939 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:45:30 - Above log line repeated 73 times more. 2017.04.27 12:45:30 - Updating systems & servers data .... 2017.04.27 12:45:32 - Systems & servers data update completed. 2017.04.27 12:46:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #140145 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:55:32 - Above log line repeated 47 times more. 2017.04.27 12:55:32 - Updating systems & servers data .... 2017.04.27 12:55:33 - Systems & servers data update completed. 2017.04.27 12:55:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #276234 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:05:33 - Above log line repeated 84 times more. 2017.04.27 13:05:33 - Updating systems & servers data .... 2017.04.27 13:05:34 - Systems & servers data update completed. 2017.04.27 13:05:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #452499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:15:34 - Above log line repeated 102 times more. 2017.04.27 13:15:34 - Updating systems & servers data .... 2017.04.27 13:15:35 - Systems & servers data update completed. 2017.04.27 13:16:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #617079 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:26:35 - Above log line repeated 77 times more. 2017.04.27 13:26:35 - Updating systems & servers data .... 2017.04.27 13:26:36 - Systems & servers data update completed. 2017.04.27 13:26:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #737474 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:35:38 - Above log line repeated 71 times more. 2017.04.27 13:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=1388300030/-1 pkts=1931236/0. 2017.04.27 13:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 13:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 13:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 13:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 13:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 13:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 13:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 13:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 13:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 13:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 13:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 13:36:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #858577 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:36:36 - Updating systems & servers data .... 2017.04.27 13:36:36 - Systems & servers data update completed. 2017.04.27 13:37:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2113 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:46:36 - Above log line repeated 49 times more. 2017.04.27 13:46:36 - Updating systems & servers data .... 2017.04.27 13:46:37 - Systems & servers data update completed. 2017.04.27 13:47:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #86468 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:56:37 - Above log line repeated 46 times more. 2017.04.27 13:56:37 - Updating systems & servers data .... 2017.04.27 13:56:38 - Systems & servers data update completed. 2017.04.27 13:56:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #175017 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:07:38 - Above log line repeated 56 times more. 2017.04.27 14:07:38 - Updating systems & servers data .... 2017.04.27 14:07:39 - Systems & servers data update completed. 2017.04.27 14:07:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #277842 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:17:40 - Above log line repeated 80 times more. 2017.04.27 14:17:40 - Updating systems & servers data .... 2017.04.27 14:17:40 - Systems & servers data update completed. 2017.04.27 14:18:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #412127 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:27:40 - Above log line repeated 72 times more. 2017.04.27 14:27:40 - Updating systems & servers data .... 2017.04.27 14:27:41 - Systems & servers data update completed. 2017.04.27 14:28:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #539818 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:35:37 - Above log line repeated 68 times more. 2017.04.27 14:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 14:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 14:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 14:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 14:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 14:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 14:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 14:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 14:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 14:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 14:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 14:36:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #629465 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:38:41 - Above log line repeated 15 times more. 2017.04.27 14:38:41 - Updating systems & servers data .... 2017.04.27 14:38:42 - Systems & servers data update completed. 2017.04.27 14:39:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #24906 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:48:42 - Above log line repeated 213 times more. 2017.04.27 14:48:42 - Updating systems & servers data .... 2017.04.27 14:48:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #105302 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:48:45 - Above log line repeated 16 times more. 2017.04.27 14:48:45 - Systems & servers data update completed. 2017.04.27 14:49:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #108534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:58:45 - Above log line repeated 609 times more. 2017.04.27 14:58:45 - Updating systems & servers data .... 2017.04.27 14:58:46 - Systems & servers data update completed. 2017.04.27 14:58:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #154350 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:08:46 - Above log line repeated 249 times more. 2017.04.27 15:08:46 - Updating systems & servers data .... 2017.04.27 15:08:50 - Systems & servers data update completed. 2017.04.27 15:09:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351513 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:18:50 - Above log line repeated 334 times more. 2017.04.27 15:18:50 - Updating systems & servers data .... 2017.04.27 15:18:52 - Systems & servers data update completed. 2017.04.27 15:19:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #519983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:28:52 - Above log line repeated 248 times more. 2017.04.27 15:28:52 - Updating systems & servers data .... 2017.04.27 15:28:52 - Systems & servers data update completed. 2017.04.27 15:28:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #707203 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:35:37 - Above log line repeated 95 times moreI 2017.04.27 15:35:37 - Renewing TLS key. 2017.04.27 15:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 15:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 15:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 15:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 15:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 15:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 15:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 15:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 15:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 15:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 15:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 15:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 15:35:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #832304 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:38:52 - Above log line repeated 55 times more. 2017.04.27 15:38:52 - Updating systems & servers data .... 2017.04.27 15:38:55 - Systems & servers data update completed. 2017.04.27 15:39:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #65620 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:48:55 - Above log line repeated 152 times more. 2017.04.27 15:48:55 - Updating systems & servers data .... 2017.04.27 15:48:56 - Systems & servers data update completed. 2017.04.27 15:49:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #269927 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:58:56 - Above log line repeated 217 times more. 2017.04.27 15:58:56 - Updating systems & servers data .... 2017.04.27 15:58:57 - Systems & servers data update completed. 2017.04.27 15:59:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #530662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:08:57 - Above log line repeated 155 times more. 2017.04.27 16:08:57 - Updating systems & servers data .... 2017.04.27 16:08:58 - Systems & servers data update completed. 2017.04.27 16:09:17 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #800405 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:18:59 - Above log line repeated 253 times more. 2017.04.27 16:18:59 - Updating systems & servers data .... 2017.04.27 16:19:01 - Systems & servers data update completed. 2017.04.27 16:19:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1060662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:29:01 - Above log line repeated 260 times more. 2017.04.27 16:29:01 - Updating systems & servers data .... 2017.04.27 16:29:07 - Systems & servers data update completed. 2017.04.27 16:29:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1307533 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:35:37 - Above log line repeated 179 times moreI 2017.04.27 16:35:37 - Renewing TLS key. 2017.04.27 16:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 16:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 16:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 16:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 16:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 16:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 16:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 16:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 16:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 16:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 16:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 16:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 16:35:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1509697 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:39:07 - Above log line repeated 269 times more. 2017.04.27 16:39:07 - Updating systems & servers data .... 2017.04.27 16:39:10 - Systems & servers data update completed. 2017.04.27 16:39:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #81204 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:49:10 - Above log line repeated 303 times more. 2017.04.27 16:49:10 - Updating systems & servers data .... 2017.04.27 16:49:11 - Systems & servers data update completed. 2017.04.27 16:49:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #379800 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:59:12 - Above log line repeated 680 times more. 2017.04.27 16:59:12 - Updating systems & servers data .... 2017.04.27 16:59:13 - Systems & servers data update completed. 2017.04.27 16:59:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #658154 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:09:13 - Above log line repeated 235 times more. 2017.04.27 17:09:13 - Updating systems & servers data .... 2017.04.27 17:09:19 - Systems & servers data update completed. 2017.04.27 17:09:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #899270 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:17:42 - Above log line repeated 99 times more. 2017.04.27 17:17:43 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 17:17:43 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 17:17:43 - Above log line repeated 70 times more. 2017.04.27 17:17:43 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 17:17:43 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 17:17:43 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 17:17:43 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 17:17:43 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 17:17:43 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 17:17:43 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 17:17:43 - OpenVPN > Closing TUN/TAP interface. 2017.04.27 17:17:43 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2017.04.27 17:17:43 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 17:17:43 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 17:17:43 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 17:17:43 - OpenVPN > Restart pause, 10 second(s)! 2017.04.27 17:17:43 - Disconnecting. 2017.04.27 17:17:43 - Management - Send 'signal SIGTERM'. 2017.04.27 17:17:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.27 17:17:43 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting. 2017.04.27 17:17:43 - Connection terminated.. 2017.04.27 17:17:44 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.27 17:17:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.27 17:17:44 - DNS leak protection with packet filtering disabled.I 2017.04.27 17:17:55 - Checking authorization ...! 2017.04.27 17:17:59 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.27 17:17:59 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 17:17:59 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 17:17:59 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 17:17:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.27 17:17:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 17:17:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 17:17:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.27 17:17:59 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.27 17:17:59 - OpenVPN > UDP link local: (not bound). 2017.04.27 17:17:59 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.27 17:17:59 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=e50e5614 1046685e. 2017.04.27 17:17:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 17:17:59 - OpenVPN > Validating certificate key usage. 2017.04.27 17:17:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 17:17:59 - OpenVPN > VERIFY KU OK. 2017.04.27 17:17:59 - OpenVPN > Validating certificate extended key usage. 2017.04.27 17:17:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 17:17:59 - OpenVPN > VERIFY EKU OK. 2017.04.27 17:17:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 17:18:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 17:18:00 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.27 17:18:01 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.27 17:18:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 35,cipher AES-256-GCM'. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.27 17:18:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 17:18:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 17:18:01 - OpenVPN > interactive service msg_channel=0. 2017.04.27 17:18:01 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.27 17:18:01 - OpenVPN > open_tun. 2017.04.27 17:18:01 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.27 17:18:01 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.27 17:18:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.27 17:18:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.27 17:18:01 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.27 17:18:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.27 17:18:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - Starting Management Interface. 2017.04.27 17:18:06 - OpenVPN > Initialization Sequence Completed. 2017.04.27 17:18:06 - DNS leak protection with packet filtering enabled.. 2017.04.27 17:18:06 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.27 17:18:06 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.27 17:18:06 - Flushing DNS. 2017.04.27 17:18:06 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 421 ms, Output: Windows IP Configuration. 2017.04.27 17:18:06 - Successfully flushed the DNS Resolver Cache.. 2017.04.27 17:18:12 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6038 ms, Output: Windows IP Configuration. 2017.04.27 17:18:12 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.27 17:18:13 - Checking routeI 2017.04.27 17:18:13 - Checking DNS! 2017.04.27 17:18:14 - Connected.. 2017.04.27 17:18:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.27 17:18:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.27 17:19:19 - Updating systems & servers data .... 2017.04.27 17:19:20 - Systems & servers data update completed. 2017.04.27 17:19:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8822 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:29:20 - Above log line repeated 662 times more. 2017.04.27 17:29:20 - Updating systems & servers data .... 2017.04.27 17:29:22 - Systems & servers data update completed. 2017.04.27 17:29:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #254700 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:39:22 - Above log line repeated 153 times more. 2017.04.27 17:39:22 - Updating systems & servers data .... 2017.04.27 17:39:23 - Systems & servers data update completed. 2017.04.27 17:39:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #428449 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:49:41 - Above log line repeated 85 times more. 2017.04.27 17:49:41 - Updating systems & servers data .... 2017.04.27 17:49:43 - Systems & servers data update completed. 2017.04.27 17:49:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #664254 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:59:43 - Above log line repeated 248 times more. 2017.04.27 17:59:43 - Updating systems & servers data .... 2017.04.27 17:59:43 - Systems & servers data update completed. 2017.04.27 18:05:00 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 18:05:01 - Above log line repeated 80 times more. 2017.04.27 18:05:01 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 18:05:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 18:05:01 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 18:05:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 18:05:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 18:05:01 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 18:05:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 18:05:01 - OpenVPN > Closing TUN/TAP interface. 2017.04.27 18:05:01 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2017.04.27 18:05:01 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 18:05:01 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 18:05:01 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 18:05:01 - OpenVPN > Restart pause, 10 second(s)! 2017.04.27 18:05:01 - Disconnecting. 2017.04.27 18:05:01 - Management - Send 'signal SIGTERM'. 2017.04.27 18:05:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.27 18:05:01 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting. 2017.04.27 18:05:01 - Connection terminated.. 2017.04.27 18:05:01 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.27 18:05:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.27 18:05:01 - DNS leak protection with packet filtering disabled.I 2017.04.27 18:05:12 - Checking authorization ...! 2017.04.27 18:05:12 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.27 18:05:12 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 18:05:12 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 18:05:12 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 18:05:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.27 18:05:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 18:05:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 18:05:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.27 18:05:12 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.27 18:05:12 - OpenVPN > UDP link local: (not bound). 2017.04.27 18:05:12 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.27 18:05:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=dc7d0595 6fa020ae. 2017.04.27 18:05:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 18:05:13 - OpenVPN > Validating certificate key usage. 2017.04.27 18:05:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 18:05:13 - OpenVPN > VERIFY KU OK. 2017.04.27 18:05:13 - OpenVPN > Validating certificate extended key usage. 2017.04.27 18:05:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 18:05:13 - OpenVPN > VERIFY EKU OK. 2017.04.27 18:05:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 18:05:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 18:05:13 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.27 18:05:14 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.27 18:05:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 78,cipher AES-256-GCM'. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.27 18:05:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 18:05:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 18:05:14 - OpenVPN > interactive service msg_channel=0. 2017.04.27 18:05:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.27 18:05:14 - OpenVPN > open_tun. 2017.04.27 18:05:14 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.27 18:05:14 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.27 18:05:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.27 18:05:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.27 18:05:14 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.27 18:05:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.27 18:05:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - Starting Management Interface. 2017.04.27 18:05:19 - OpenVPN > Initialization Sequence Completed. 2017.04.27 18:05:19 - DNS leak protection with packet filtering enabled.. 2017.04.27 18:05:19 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.27 18:05:19 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.27 18:05:19 - Flushing DNS. 2017.04.27 18:05:19 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 437 ms, Output: Windows IP Configuration. 2017.04.27 18:05:19 - Successfully flushed the DNS Resolver Cache.. 2017.04.27 18:05:25 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6021 ms, Output: Windows IP Configuration. 2017.04.27 18:05:25 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.27 18:05:25 - Checking routeI 2017.04.27 18:05:26 - Checking DNS! 2017.04.27 18:05:26 - Connected.. 2017.04.27 18:05:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.27 18:05:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.27 18:05:46 - Updating systems & servers data .... 2017.04.27 18:05:47 - Systems & servers data update completed. 2017.04.27 18:07:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8482 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:15:48 - Above log line repeated 422 times more. 2017.04.27 18:15:48 - Updating systems & servers data .... 2017.04.27 18:15:50 - Systems & servers data update completed. 2017.04.27 18:15:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #320681 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:25:58 - Above log line repeated 52 times more. 2017.04.27 18:25:58 - Updating systems & servers data .... 2017.04.27 18:26:00 - Systems & servers data update completed. 2017.04.27 18:26:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #466910 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:36:00 - Above log line repeated 67 times more. 2017.04.27 18:36:00 - Updating systems & servers data .... 2017.04.27 18:36:02 - Systems & servers data update completed. 2017.04.27 18:36:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #646832 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:46:10 - Above log line repeated 185 times more. 2017.04.27 18:46:10 - Updating systems & servers data .... 2017.04.27 18:46:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #859648 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:46:11 - Above log line repeated 1 times more. 2017.04.27 18:46:11 - Systems & servers data update completed. 2017.04.27 18:46:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #880040 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:56:12 - Above log line repeated 792 times more. 2017.04.27 18:56:12 - Updating systems & servers data .... 2017.04.27 18:56:12 - Systems & servers data update completed. 2017.04.27 18:56:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1206881 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:05:13 - Above log line repeated 775 times more. 2017.04.27 19:05:13 - OpenVPN > TLS: soft reset sec=0 bytes=2102133928/-1 pkts=2734150/0. 2017.04.27 19:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 19:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 19:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 19:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 19:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 19:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 19:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 19:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 19:05:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 19:05:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 19:05:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 19:05:43 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1527376 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:06:13 - Above log line repeated 46 times more. 2017.04.27 19:06:13 - Updating systems & servers data .... 2017.04.27 19:06:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1540168 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:06:14 - Systems & servers data update completed. 2017.04.27 19:06:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4934 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:16:32 - Above log line repeated 899 times more. 2017.04.27 19:16:32 - Updating systems & servers data .... 2017.04.27 19:16:33 - Systems & servers data update completed. 2017.04.27 19:16:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #409896 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:26:33 - Above log line repeated 489 times more. 2017.04.27 19:26:33 - Updating systems & servers data .... 2017.04.27 19:26:35 - Systems & servers data update completed. 2017.04.27 19:26:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #770551 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:36:35 - Above log line repeated 436 times more. 2017.04.27 19:36:35 - Updating systems & servers data .... 2017.04.27 19:36:35 - Systems & servers data update completed. 2017.04.27 19:36:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1235479 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:46:35 - Above log line repeated 139 times more. 2017.04.27 19:46:35 - Updating systems & servers data .... 2017.04.27 19:46:36 - Systems & servers data update completed. 2017.04.27 19:46:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1424456 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:56:36 - Above log line repeated 115 times more. 2017.04.27 19:56:36 - Updating systems & servers data .... 2017.04.27 19:56:37 - Systems & servers data update completed. 2017.04.27 19:56:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1621608 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:05:13 - Above log line repeated 39 times moreI 2017.04.27 20:05:13 - Renewing TLS key. 2017.04.27 20:05:13 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 20:05:15 - OpenVPN > TLS: soft reset sec=0 bytes=2461165245/-1 pkts=3072589/0. 2017.04.27 20:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 20:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 20:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 20:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 20:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 20:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 20:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 20:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 20:05:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 20:05:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 20:05:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 20:05:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1784356 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:07:37 - Above log line repeated 31 times more. 2017.04.27 20:07:37 - Updating systems & servers data .... 2017.04.27 20:07:39 - Systems & servers data update completed. 2017.04.27 20:08:05 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #38438 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:17:39 - Above log line repeated 87 times more. 2017.04.27 20:17:39 - Updating systems & servers data .... 2017.04.27 20:17:40 - Systems & servers data update completed. 2017.04.27 20:17:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #256556 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:27:40 - Above log line repeated 94 times more. 2017.04.27 20:27:40 - Updating systems & servers data .... 2017.04.27 20:27:41 - Systems & servers data update completed. 2017.04.27 20:28:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #496612 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:38:41 - Above log line repeated 131 times more. 2017.04.27 20:38:41 - Updating systems & servers data .... 2017.04.27 20:38:44 - Systems & servers data update completed. 2017.04.27 20:38:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #713707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:48:44 - Above log line repeated 151 times more. 2017.04.27 20:48:44 - Updating systems & servers data .... 2017.04.27 20:48:45 - Systems & servers data update completed. 2017.04.27 20:49:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #963631 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:58:45 - Above log line repeated 177 times more. 2017.04.27 20:58:45 - Updating systems & servers data .... 2017.04.27 20:58:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1156281 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:58:47 - Above log line repeated 1 times more. 2017.04.27 20:58:47 - Systems & servers data update completed. 2017.04.27 20:58:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1160703 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:05:15 - Above log line repeated 80 times more. 2017.04.27 21:05:15 - OpenVPN > TLS: soft reset sec=0 bytes=1974258904/-1 pkts=2595305/0. 2017.04.27 21:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 21:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 21:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 21:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 21:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 21:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 21:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 21:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 21:05:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 21:05:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 21:05:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 21:05:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1344923 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:08:47 - Above log line repeated 39 times more. 2017.04.27 21:08:47 - Updating systems & servers data .... 2017.04.27 21:08:49 - Systems & servers data update completed. 2017.04.27 21:08:52 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #90502 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:18:49 - Above log line repeated 203 times more. 2017.04.27 21:18:49 - Updating systems & servers data .... 2017.04.27 21:18:51 - Systems & servers data update completed. 2017.04.27 21:19:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422275 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:28:51 - Above log line repeated 375 times more. 2017.04.27 21:28:51 - Updating systems & servers data .... 2017.04.27 21:28:54 - Systems & servers data update completed. 2017.04.27 21:28:59 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #733500 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:38:54 - Above log line repeated 391 times more. 2017.04.27 21:38:54 - Updating systems & servers data .... 2017.04.27 21:38:57 - Systems & servers data update completed. 2017.04.27 21:39:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #995814 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:48:57 - Above log line repeated 400 times more. 2017.04.27 21:48:57 - Updating systems & servers data .... 2017.04.27 21:48:58 - Systems & servers data update completed. 2017.04.27 21:49:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1215242 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:58:58 - Above log line repeated 679 times more. 2017.04.27 21:58:58 - Updating systems & servers data .... 2017.04.27 21:59:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1498726 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:59:05 - Above log line repeated 3 times more. 2017.04.27 21:59:05 - Systems & servers data update completed. 2017.04.27 21:59:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1503297 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:05:15 - Above log line repeated 599 times moreI 2017.04.27 22:05:15 - Renewing TLS key. 2017.04.27 22:05:15 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 22:05:16 - OpenVPN > TLS: soft reset sec=0 bytes=2387745470/-1 pkts=2950263/0. 2017.04.27 22:05:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 22:05:16 - OpenVPN > Validating certificate key usage. 2017.04.27 22:05:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 22:05:16 - OpenVPN > VERIFY KU OK. 2017.04.27 22:05:16 - OpenVPN > Validating certificate extended key usage. 2017.04.27 22:05:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 22:05:16 - OpenVPN > VERIFY EKU OK. 2017.04.27 22:05:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 22:05:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 22:05:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 22:05:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 22:05:21 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1699186 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:09:06 - Above log line repeated 382 times more. 2017.04.27 22:09:06 - Updating systems & servers data .... 2017.04.27 22:09:07 - Systems & servers data update completed. 2017.04.27 22:09:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #102194 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:19:07 - Above log line repeated 1146 times more. 2017.04.27 22:19:07 - Updating systems & servers data .... 2017.04.27 22:19:10 - Systems & servers data update completed. 2017.04.27 22:19:12 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #583386 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:29:10 - Above log line repeated 2112 times more. 2017.04.27 22:29:10 - Updating systems & servers data .... 2017.04.27 22:29:13 - Systems & servers data update completed. 2017.04.27 22:29:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1518607 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:39:14 - Above log line repeated 3234 times more. 2017.04.27 22:39:14 - Updating systems & servers data .... 2017.04.27 22:39:15 - Systems & servers data update completed. 2017.04.27 22:39:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2517231 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:49:15 - Above log line repeated 3098 times more. 2017.04.27 22:49:15 - Updating systems & servers data .... 2017.04.27 22:49:17 - Systems & servers data update completed. 2017.04.27 22:49:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3506690 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:59:18 - Above log line repeated 3121 times more. 2017.04.27 22:59:18 - Updating systems & servers data .... 2017.04.27 22:59:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4505608 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:59:19 - Above log line repeated 10 times more. 2017.04.27 22:59:19 - Systems & servers data update completed. 2017.04.27 22:59:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4506839 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:05:16 - Above log line repeated 2433 times moreI 2017.04.27 23:05:16 - Renewing TLS key. 2017.04.27 23:05:16 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 23:05:17 - OpenVPN > TLS: soft reset sec=0 bytes=6594705080/-1 pkts=7783489/0. 2017.04.27 23:05:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 23:05:17 - OpenVPN > Validating certificate key usage. 2017.04.27 23:05:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 23:05:17 - OpenVPN > VERIFY KU OK. 2017.04.27 23:05:17 - OpenVPN > Validating certificate extended key usage. 2017.04.27 23:05:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 23:05:17 - OpenVPN > VERIFY EKU OK. 2017.04.27 23:05:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 23:05:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 23:05:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 23:05:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 23:05:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5130911 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:09:19 - Above log line repeated 702 times more. 2017.04.27 23:09:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #264926 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:09:19 - Updating systems & servers data .... 2017.04.27 23:09:20 - Above log line repeated 8 times more. 2017.04.27 23:09:20 - Systems & servers data update completed. 2017.04.27 23:09:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #273058 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:19:20 - Above log line repeated 3371 times more. 2017.04.27 23:19:20 - Updating systems & servers data .... 2017.04.27 23:19:21 - Systems & servers data update completed. 2017.04.27 23:19:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1222775 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:29:21 - Above log line repeated 1430 times more. 2017.04.27 23:29:21 - Updating systems & servers data .... 2017.04.27 23:29:25 - Systems & servers data update completed. 2017.04.27 23:29:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1979276 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:39:25 - Above log line repeated 431 times more. 2017.04.27 23:39:25 - Updating systems & servers data .... 2017.04.27 23:39:26 - Systems & servers data update completed. 2017.04.27 23:39:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2366454 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:49:28 - Above log line repeated 425 times more. 2017.04.27 23:49:28 - Updating systems & servers data .... 2017.04.27 23:49:30 - Systems & servers data update completed. 2017.04.27 23:49:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2821669 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:59:30 - Above log line repeated 946 times more. 2017.04.27 23:59:30 - Updating systems & servers data .... 2017.04.27 23:59:32 - Systems & servers data update completed. 2017.04.27 23:59:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3475696 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:02:52 - Above log line repeated 251 times more! 2017.04.28 00:02:52 - Disconnecting. 2017.04.28 00:02:52 - Management - Send 'signal SIGTERM'. 2017.04.28 00:02:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.28 00:02:52 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > Closing TUN/TAP interface. 2017.04.28 00:02:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.04.28 00:02:57 - Connection terminated.. 2017.04.28 00:02:57 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.28 00:02:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.28 00:02:57 - DNS leak protection with packet filtering disabled.I 2017.04.28 00:02:57 - Checking authorization ...! 2017.04.28 00:02:57 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.28 00:02:57 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.28 00:02:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.28 00:02:57 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.28 00:02:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.28 00:02:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.28 00:02:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.28 00:02:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.28 00:02:58 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.28 00:02:58 - OpenVPN > UDP link local: (not bound). 2017.04.28 00:02:58 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.28 00:03:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=bf870299 c25ee78a. 2017.04.28 00:03:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.28 00:03:27 - OpenVPN > Validating certificate key usage. 2017.04.28 00:03:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.28 00:03:27 - OpenVPN > VERIFY KU OK. 2017.04.28 00:03:27 - OpenVPN > Validating certificate extended key usage. 2017.04.28 00:03:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.28 00:03:27 - OpenVPN > VERIFY EKU OK. 2017.04.28 00:03:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.28 00:03:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.28 00:03:27 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.28 00:03:28 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.28 00:03:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.28 00:03:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.28 00:03:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.28 00:03:28 - OpenVPN > interactive service msg_channel=0. 2017.04.28 00:03:28 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.28 00:03:28 - OpenVPN > open_tun. 2017.04.28 00:03:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.28 00:03:28 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.28 00:03:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.28 00:03:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.28 00:03:28 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.28 00:03:28 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.28 00:03:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - Starting Management Interface. 2017.04.28 00:03:33 - OpenVPN > Initialization Sequence Completed. 2017.04.28 00:03:33 - DNS leak protection with packet filtering enabled.. 2017.04.28 00:03:33 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.28 00:03:33 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.28 00:03:33 - Flushing DNS. 2017.04.28 00:03:33 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 421 ms, Output: Windows IP Configuration. 2017.04.28 00:03:33 - Successfully flushed the DNS Resolver Cache.. 2017.04.28 00:03:39 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6022 ms, Output: Windows IP Configuration. 2017.04.28 00:03:39 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.28 00:03:39 - Checking routeI 2017.04.28 00:03:40 - Checking DNS! 2017.04.28 00:03:40 - Connected.. 2017.04.28 00:03:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.28 00:03:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.28 00:06:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #125026 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:09:32 - Above log line repeated 47 times more. 2017.04.28 00:09:32 - Updating systems & servers data .... 2017.04.28 00:09:35 - Systems & servers data update completed. 2017.04.28 00:10:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #330255 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:19:35 - Above log line repeated 86 times more. 2017.04.28 00:19:35 - Updating systems & servers data .... 2017.04.28 00:19:38 - Systems & servers data update completed. 2017.04.28 00:19:39 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #851976 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:29:38 - Above log line repeated 153 times more. 2017.04.28 00:29:38 - Updating systems & servers data .... 2017.04.28 00:29:40 - Systems & servers data update completed. 2017.04.28 00:30:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1271942 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:39:41 - Above log line repeated 115 times more. 2017.04.28 00:39:41 - Updating systems & servers data .... 2017.04.28 00:39:42 - Systems & servers data update completed. 2017.04.28 00:40:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1620746 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:49:42 - Above log line repeated 131 times more. 2017.04.28 00:49:42 - Updating systems & servers data .... 2017.04.28 00:49:43 - Systems & servers data update completed. 2017.04.28 00:50:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1848282 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings I hope I have provided enough information to figure out what's going on. It is getting on rather late here and I do have a rather busy day tomorrow so it may be a while until I'll be back here to respond again. I think AirVPN is a great service and I absolutely will want to continue using it for the foreseeable future if these issues can be resolved. Thank you in advance, Jurriaany, excited yet troubled customer.
  5. if you have amd apu probally in panel control you have installed "amd quick stream", UNINSTALL it, or in alternative uncheck "appex accelerator" in "TAP-Windows Adapter V9 - properties", they cause constant disconnection. Hope this help
  6. I got disconnected frequently today. Is it switching servers in between because thats what the message pops up? If you run VPN then TOR and airVPN gets disconnected what happens? My real IP is exposed?
  7. Starting this morning, my RPI servers started experiencing disconnects. I have to run tcp client, since UDP on 443 seems to get messed with somehow. Is there a fix? Everything has been working with TCP But suddenly, began disconnecting and reconnecting almost immediately again and again. Thankfully, I am sorted now. Based on info in the forums about possible DNS hijacking, I changed my openvpn config to Canada from all North America and for greater certainty reset my iptables rules from the latest client. Best way to do this, I found is by running the latest client on my linux laptop, exporting the rules using (as root) >iptables-save > iptables_2016-03-12.saved That generates a file that can be loaded on any linux box using: >iptables-restore <iptables_2016-03-12.saved then remembering to do: > sudo netfilter-persistent save This guarantees the network lock persists across reboots. My connections have been up 40 minutes and an hour plus since then. Anybody else notice anything?
  8. I am unable to connect to any server. I get constant disconnects. I downgraded the Tap driver already. Grateful for every help. I have been trying for hours, but I don't get anywhere. This is my first day after switching from nvpn.net. I hope you can help me. Neither the Airvpn, nor the opvn client work for me. I 2016.03.10 21:28:14 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64. 2016.03.10 21:28:14 - Reading options from C:\Users\phisch\AppData\Local\AirVPN\AirVPN.xml. 2016.03.10 21:28:14 - Data Path: C:\Users\phisch\AppData\Local\AirVPN. 2016.03.10 21:28:14 - App Path: C:\Program Files\AirVPN. 2016.03.10 21:28:14 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.03.10 21:28:14 - Command line arguments (1): path="home". 2016.03.10 21:28:14 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1. 2016.03.10 21:28:14 - Updating systems & servers data .... 2016.03.10 21:28:14 - Systems & servers data update completedI 2016.03.10 21:28:16 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.03.10 21:28:16 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.03.10 21:28:16 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.03.10 21:28:16 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.03.10 21:28:16 - ReadyI 2016.03.10 21:33:05 - Session starting.W 2016.03.10 21:33:05 - Tunnel driver will be upgraded, from 9.9.1 to 9.21.1.! 2016.03.10 21:33:05 - Installing tunnel driverI 2016.03.10 21:33:12 - IPv6 disabled.I 2016.03.10 21:33:12 - Checking authorization ...! 2016.03.10 21:33:13 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:33:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:33:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:33:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:33:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:33:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:33:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:33:13 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:33:13 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:33:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:33:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=4d2d37fb e1db6844. 2016.03.10 21:33:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:33:13 - OpenVPN > Validating certificate key usage. 2016.03.10 21:33:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:33:13 - OpenVPN > VERIFY KU OK. 2016.03.10 21:33:13 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:33:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:33:13 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:33:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:33:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:33:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:33:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:33:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:33:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:33:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:33:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:33:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:33:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:33:18 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:33:18 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap. 2016.03.10 21:33:18 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:33:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:33:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:33:18 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}. 2016.03.10 21:33:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:33:23 - Starting Management Interface. 2016.03.10 21:33:23 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:33:23 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:33:23 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:33:23 - Flushing DNSI 2016.03.10 21:33:23 - Checking routeW 2016.03.10 21:34:13 - Timeout für Vorgang überschritten! 2016.03.10 21:34:13 - Disconnecting. 2016.03.10 21:34:13 - Management - Send 'signal SIGTERM'. 2016.03.10 21:34:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:34:13 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:34:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:34:18 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:34:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:34:18 - Connection terminated.I 2016.03.10 21:34:19 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:34:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:34:22 - Checking authorization ...! 2016.03.10 21:34:22 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:34:22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:34:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:34:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:34:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:34:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:34:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:34:22 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:34:22 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:34:22 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:34:22 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=50bd56c3 0e341237. 2016.03.10 21:34:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:34:22 - OpenVPN > Validating certificate key usage. 2016.03.10 21:34:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:34:22 - OpenVPN > VERIFY KU OK. 2016.03.10 21:34:22 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:34:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:34:22 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:34:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:34:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:34:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:34:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:34:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:34:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:34:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:34:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:34:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:34:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:34:27 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:34:27 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap. 2016.03.10 21:34:27 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:34:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:34:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:34:27 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}. 2016.03.10 21:34:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:34:32 - Starting Management Interface. 2016.03.10 21:34:32 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:34:32 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:34:32 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:34:32 - Flushing DNSI 2016.03.10 21:34:32 - Checking routeW 2016.03.10 21:35:22 - Timeout für Vorgang überschritten! 2016.03.10 21:35:22 - Disconnecting. 2016.03.10 21:35:22 - Management - Send 'signal SIGTERM'. 2016.03.10 21:35:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:35:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:35:22 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:35:27 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:35:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:35:27 - Connection terminated.I 2016.03.10 21:35:27 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:35:27 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:35:30 - Checking authorization ...! 2016.03.10 21:35:30 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:35:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:35:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:35:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:35:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:35:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:30 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:35:30 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:35:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:35:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=96ca1e25 55a2f2e7. 2016.03.10 21:35:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:35:30 - OpenVPN > Validating certificate key usage. 2016.03.10 21:35:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:35:30 - OpenVPN > VERIFY KU OK. 2016.03.10 21:35:30 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:35:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:35:30 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:35:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:35:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:35:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:35:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:35:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:35:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:35:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:35:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:35:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:35:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap. 2016.03.10 21:35:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:35:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:35:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:35:39 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}. 2016.03.10 21:35:42 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.03.10 21:35:42 - OpenVPN > Exiting due to fatal error. 2016.03.10 21:35:42 - OpenVPN > Closing TUN/TAP interface! 2016.03.10 21:35:42 - Disconnecting. 2016.03.10 21:35:42 - Connection terminated.I 2016.03.10 21:35:45 - Checking authorization ...! 2016.03.10 21:35:45 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:35:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:35:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:35:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:35:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:35:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:45 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:35:45 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:35:45 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:35:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=04efa9f3 2f40cac4. 2016.03.10 21:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:35:45 - OpenVPN > Validating certificate key usage. 2016.03.10 21:35:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:35:45 - OpenVPN > VERIFY KU OK. 2016.03.10 21:35:45 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:35:45 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:35:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:35:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:35:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:35:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:35:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:35:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:35:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:35:51 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2016.03.10 21:35:51 - OpenVPN > Exiting due to fatal error! 2016.03.10 21:35:51 - Disconnecting. 2016.03.10 21:35:51 - Connection terminated.I 2016.03.10 21:35:53 - Cancel requested.I 2016.03.10 21:35:53 - IPv6 restored.! 2016.03.10 21:35:53 - Session terminated.I 2016.03.10 21:36:28 - Session starting.W 2016.03.10 21:36:28 - Tunnel driver will be upgraded, from 9.9.1 to 9.21.1.! 2016.03.10 21:36:28 - Installing tunnel driverI 2016.03.10 21:36:34 - IPv6 disabled.I 2016.03.10 21:36:34 - Checking authorization ...! 2016.03.10 21:36:34 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:36:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:36:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:36:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:36:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:36:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:36:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:36:34 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:36:34 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:36:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:36:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=77418a7f 4c92e88d. 2016.03.10 21:36:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:36:34 - OpenVPN > Validating certificate key usage. 2016.03.10 21:36:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:36:34 - OpenVPN > VERIFY KU OK. 2016.03.10 21:36:34 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:36:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:36:34 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:36:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:36:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:36:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:36:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:36:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:36:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:36:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:36:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:36:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:36:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:36:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:36:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap. 2016.03.10 21:36:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:36:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:36:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:36:39 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}. 2016.03.10 21:36:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:36:44 - Starting Management Interface. 2016.03.10 21:36:44 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:36:44 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:36:44 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:36:44 - Flushing DNSI 2016.03.10 21:36:44 - Checking routeW 2016.03.10 21:37:34 - Timeout für Vorgang überschritten! 2016.03.10 21:37:34 - Disconnecting. 2016.03.10 21:37:34 - Management - Send 'signal SIGTERM'. 2016.03.10 21:37:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:37:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:37:34 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:37:39 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:37:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:37:40 - Connection terminated.I 2016.03.10 21:37:40 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:37:40 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:37:43 - Checking authorization ...! 2016.03.10 21:37:43 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:37:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:37:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:37:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:37:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:37:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:37:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:37:43 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:37:43 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:37:43 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:37:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=81b54f3a 930c537a. 2016.03.10 21:37:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:37:43 - OpenVPN > Validating certificate key usage. 2016.03.10 21:37:43 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:37:43 - OpenVPN > VERIFY KU OK. 2016.03.10 21:37:43 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:37:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:37:43 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:37:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:37:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:37:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:37:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:37:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:37:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:37:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:37:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:37:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:37:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:37:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:37:48 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap. 2016.03.10 21:37:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:37:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:37:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:37:48 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}. 2016.03.10 21:37:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:37:53 - Starting Management Interface. 2016.03.10 21:37:53 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:37:53 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:37:53 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:37:53 - Flushing DNSI 2016.03.10 21:37:53 - Checking routeW 2016.03.10 21:38:43 - Timeout für Vorgang überschritten! 2016.03.10 21:38:43 - Disconnecting. 2016.03.10 21:38:43 - Management - Send 'signal SIGTERM'. 2016.03.10 21:38:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:38:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:38:43 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:38:48 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:38:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:38:48 - Connection terminated.I 2016.03.10 21:38:48 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:38:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:38:51 - Checking authorization ...! 2016.03.10 21:38:51 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:38:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:38:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:38:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:38:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:38:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:38:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:38:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:38:51 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:38:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:38:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=37c0eeb7 4d02c84c. 2016.03.10 21:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:38:52 - OpenVPN > Validating certificate key usage. 2016.03.10 21:38:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:38:52 - OpenVPN > VERIFY KU OK. 2016.03.10 21:38:52 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:38:52 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:38:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:38:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:38:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:38:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:38:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:38:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:38:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:38:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:38:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:38:57 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:38:57 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap. 2016.03.10 21:38:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:38:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:38:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:38:57 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}. 2016.03.10 21:39:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:39:02 - Starting Management Interface. 2016.03.10 21:39:02 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:39:02 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:39:02 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:39:02 - Flushing DNSI 2016.03.10 21:39:02 - Checking routeW 2016.03.10 21:39:52 - Timeout für Vorgang überschritten! 2016.03.10 21:39:52 - Disconnecting. 2016.03.10 21:39:52 - Management - Send 'signal SIGTERM'. 2016.03.10 21:39:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:39:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:39:52 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:39:57 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:39:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:39:57 - Connection terminated.I 2016.03.10 21:39:58 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:39:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:40:01 - Checking authorization ...! 2016.03.10 21:40:01 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:40:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:40:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:40:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:40:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:40:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:01 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:40:01 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:40:01 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:40:01 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=fd4e0faf 8c078285. 2016.03.10 21:40:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:40:01 - OpenVPN > Validating certificate key usage. 2016.03.10 21:40:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:40:01 - OpenVPN > VERIFY KU OK. 2016.03.10 21:40:01 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:40:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:40:01 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:40:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:40:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:40:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:40:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:40:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:40:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:40:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:40:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:40:05 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:40:06 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap. 2016.03.10 21:40:06 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.03.10 21:40:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:40:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:40:06 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}. 2016.03.10 21:40:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:40:10 - Starting Management Interface. 2016.03.10 21:40:10 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:40:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:40:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:40:10 - Flushing DNSI 2016.03.10 21:40:10 - Checking route! 2016.03.10 21:40:21 - Disconnecting. 2016.03.10 21:40:21 - Connection terminated.E 2016.03.10 21:40:21 - Routing checking failed.. 2016.03.10 21:40:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.03.10 21:40:21 - OpenVPN > MANAGEMENT: Client disconnected. 2016.03.10 21:40:21 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.03.10 21:40:21 - OpenVPN > Exiting due to fatal error. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:40:21 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.03.10 21:40:21 - OpenVPN > Route deletion fallback to route.exe. 2016.03.10 21:40:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:40:21 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.03.10 21:40:21 - OpenVPN > Route deletion fallback to route.exe. 2016.03.10 21:40:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.03.10 21:40:21 - OpenVPN > Closing TUN/TAP interfaceI 2016.03.10 21:40:21 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller). 2016.03.10 21:40:24 - Cannot find tunnel adapter.I 2016.03.10 21:40:24 - Checking authorization ...! 2016.03.10 21:40:25 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:40:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:40:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:40:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:40:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:40:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:25 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:40:25 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:40:25 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:40:25 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=aead2153 32278b1e. 2016.03.10 21:40:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:40:25 - OpenVPN > Validating certificate key usage. 2016.03.10 21:40:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:40:25 - OpenVPN > VERIFY KU OK. 2016.03.10 21:40:25 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:40:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:40:25 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:40:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:40:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:40:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:40:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:40:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:40:30 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2016.03.10 21:40:30 - OpenVPN > Exiting due to fatal error! 2016.03.10 21:40:30 - Disconnecting. 2016.03.10 21:40:30 - Connection terminated.I 2016.03.10 21:40:30 - Cancel requested.I 2016.03.10 21:40:30 - IPv6 restored.! 2016.03.10 21:40:30 - Session terminated.! 2016.03.10 21:43:42 - Activation of Network Lock - Windows FirewallI 2016.03.10 21:43:54 - Session starting.. 2016.03.10 21:43:54 - Cannot find tunnel adapter.! 2016.03.10 21:43:54 - Installing tunnel driver. 2016.03.10 21:44:02 - Cannot find tunnel adapter.F 2016.03.10 21:44:02 - Driver installation failed.I 2016.03.10 21:44:50 - Session starting.I 2016.03.10 21:44:50 - IPv6 disabled.I 2016.03.10 21:44:50 - Checking authorization ...! 2016.03.10 21:44:50 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:44:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:44:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:44:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:44:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:44:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:44:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:44:50 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:44:50 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:44:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:44:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=d2ce93ee ae0acc94. 2016.03.10 21:44:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:44:50 - OpenVPN > Validating certificate key usage. 2016.03.10 21:44:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:44:50 - OpenVPN > VERIFY KU OK. 2016.03.10 21:44:50 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:44:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:44:50 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:44:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:44:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:44:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:44:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:44:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:44:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:44:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:44:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:44:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:44:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:44:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:44:55 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap. 2016.03.10 21:44:55 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.03.10 21:44:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:44:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:44:55 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}. 2016.03.10 21:45:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:45:00 - Starting Management Interface. 2016.03.10 21:45:00 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:45:00 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:45:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:45:00 - Flushing DNSI 2016.03.10 21:45:00 - Checking route! 2016.03.10 21:45:00 - Connected.. 2016.03.10 21:45:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.03.10 21:45:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.03.10 21:48:56 - Disconnecting. 2016.03.10 21:48:56 - Management - Send 'signal SIGTERM'. 2016.03.10 21:48:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:48:56 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:49:01 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:49:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:49:01 - Connection terminated.I 2016.03.10 21:49:01 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:49:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:49:01 - IPv6 restored.! 2016.03.10 21:49:01 - Session terminated.! 2016.03.10 21:49:04 - Deactivation of Network LockI 2016.03.10 21:50:31 - Session starting.I 2016.03.10 21:50:31 - IPv6 disabled.I 2016.03.10 21:50:31 - Checking authorization ...! 2016.03.10 21:50:31 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:50:31 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:50:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:50:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:50:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:50:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:50:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:50:31 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:50:31 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:50:31 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:50:31 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=0c1a9814 fc369555. 2016.03.10 21:50:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:50:31 - OpenVPN > Validating certificate key usage. 2016.03.10 21:50:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:50:31 - OpenVPN > VERIFY KU OK. 2016.03.10 21:50:31 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:50:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:50:31 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:50:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:50:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:50:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:50:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:50:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:50:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:50:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:50:35 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:50:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:50:35 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:50:35 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:50:35 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap. 2016.03.10 21:50:35 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.03.10 21:50:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:50:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:50:35 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}. 2016.03.10 21:50:40 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:50:40 - Starting Management Interface. 2016.03.10 21:50:40 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:50:40 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:50:40 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:50:40 - Flushing DNSI 2016.03.10 21:50:40 - Checking routeW 2016.03.10 21:51:30 - Timeout für Vorgang überschritten! 2016.03.10 21:51:30 - Disconnecting. 2016.03.10 21:51:30 - Management - Send 'signal SIGTERM'. 2016.03.10 21:51:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:51:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:51:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:51:35 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:51:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:51:35 - Connection terminated.I 2016.03.10 21:51:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:51:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:51:38 - Checking authorization ...! 2016.03.10 21:51:38 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:51:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:51:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:51:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:51:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:51:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:51:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:51:38 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:51:38 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:51:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:51:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=6e098db6 8adf9a5d. 2016.03.10 21:51:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:51:38 - OpenVPN > Validating certificate key usage. 2016.03.10 21:51:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:51:38 - OpenVPN > VERIFY KU OK. 2016.03.10 21:51:38 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:51:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:51:38 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:51:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:51:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:51:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:51:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:51:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:51:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:51:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:51:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:51:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:51:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:51:43 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:51:43 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap. 2016.03.10 21:51:43 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.03.10 21:51:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:51:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:51:43 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}. 2016.03.10 21:51:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:51:48 - Starting Management Interface. 2016.03.10 21:51:48 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:51:48 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:51:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:51:48 - Flushing DNSI 2016.03.10 21:51:48 - Checking routeW 2016.03.10 21:52:38 - Timeout für Vorgang überschritten! 2016.03.10 21:52:38 - Disconnecting. 2016.03.10 21:52:38 - Management - Send 'signal SIGTERM'. 2016.03.10 21:52:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:52:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:52:38 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:52:43 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:52:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:52:43 - Connection terminated.I 2016.03.10 21:52:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:52:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:52:46 - Checking authorization ...! 2016.03.10 21:52:46 - Connecting to Rukbat (Netherlands, Alblasserdam). 2016.03.10 21:52:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.03.10 21:52:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.03.10 21:52:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.03.10 21:52:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.03.10 21:52:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:52:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:52:46 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.03.10 21:52:46 - OpenVPN > UDPv4 link local: [undef]. 2016.03.10 21:52:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443. 2016.03.10 21:52:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=effa6030 774356e1. 2016.03.10 21:52:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.03.10 21:52:46 - OpenVPN > Validating certificate key usage. 2016.03.10 21:52:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.03.10 21:52:46 - OpenVPN > VERIFY KU OK. 2016.03.10 21:52:46 - OpenVPN > Validating certificate extended key usage. 2016.03.10 21:52:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.03.10 21:52:46 - OpenVPN > VERIFY EKU OK. 2016.03.10 21:52:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.03.10 21:52:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:52:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:52:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.03.10 21:52:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.03.10 21:52:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.03.10 21:52:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443. 2016.03.10 21:52:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.03.10 21:52:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.03.10 21:52:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.03.10 21:52:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.03.10 21:52:50 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap. 2016.03.10 21:52:50 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.03.10 21:52:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]. 2016.03.10 21:52:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.03.10 21:52:50 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}. 2016.03.10 21:52:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.03.10 21:52:55 - Starting Management Interface. 2016.03.10 21:52:55 - OpenVPN > Initialization Sequence CompletedI 2016.03.10 21:52:55 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.03.10 21:52:55 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.03.10 21:52:55 - Flushing DNSI 2016.03.10 21:52:55 - Checking routeW 2016.03.10 21:53:45 - Timeout für Vorgang überschritten! 2016.03.10 21:53:45 - Disconnecting. 2016.03.10 21:53:45 - Management - Send 'signal SIGTERM'. 2016.03.10 21:53:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.03.10 21:53:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.03.10 21:53:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.03.10 21:53:51 - OpenVPN > Closing TUN/TAP interface. 2016.03.10 21:53:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.03.10 21:53:51 - Connection terminated.I 2016.03.10 21:53:51 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.03.10 21:53:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.03.10 21:53:51 - Cancel requested.I 2016.03.10 21:53:51 - IPv6 restored.! 2016.03.10 21:53:51 - Session terminated.
  9. Hi, Since a couple of months now my AirVPN client experiences random disconnects. Connecting to different servers doesn't help. I'm seeing a lot of errors like these in the logs, but based on the time they occur they don't seem to have anything to do with the disconnects: . 2015.04.25 12:25:16 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #941810 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings This is where the disconnect and reconnect begins: . 2015.04.25 11:07:13 - Updating systems & servers data ... . 2015.04.25 11:07:13 - Systems & servers data update completed . 2015.04.25 11:12:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2015.04.25 11:12:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2015.04.25 11:12:52 - OpenVPN > Restart pause, 2 second(s) ! 2015.04.25 11:12:52 - Disconnecting . 2015.04.25 11:12:52 - Management - Send 'signal SIGTERM' . 2015.04.25 11:12:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.04.25 11:12:52 - OpenVPN > MANAGEMENT: Client disconnected . 2015.04.25 11:12:52 - OpenVPN > Assertion failed at misc.c:788 . 2015.04.25 11:12:52 - OpenVPN > Exiting due to fatal error . 2015.04.25 11:12:52 - Connection terminated. I 2015.04.25 11:13:01 - Checking authorization ... ! 2015.04.25 11:13:02 - Connecting to Mizar (Netherlands, Amsterdam) . 2015.04.25 11:13:02 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2015.04.25 11:13:02 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2015.04.25 11:13:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.04.25 11:13:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.04.25 11:13:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.04.25 11:13:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.04.25 11:13:02 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2015.04.25 11:13:02 - OpenVPN > UDPv4 link local: [undef] . 2015.04.25 11:13:02 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.74.18:443 . 2015.04.25 11:13:02 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.74.18:443, sid=43b93436 ad0b7faa . 2015.04.25 11:13:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.04.25 11:13:02 - OpenVPN > Validating certificate key usage . 2015.04.25 11:13:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.04.25 11:13:02 - OpenVPN > VERIFY KU OK . 2015.04.25 11:13:02 - OpenVPN > Validating certificate extended key usage . 2015.04.25 11:13:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.04.25 11:13:02 - OpenVPN > VERIFY EKU OK . 2015.04.25 11:13:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.04.25 11:13:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.04.25 11:13:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.04.25 11:13:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.04.25 11:13:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.04.25 11:13:02 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.04.25 11:13:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.74.18:443 . 2015.04.25 11:13:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.04.25 11:13:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.16 255.255.0.0' . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2015.04.25 11:13:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.04.25 11:13:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.04.25 11:13:04 - OpenVPN > open_tun, tt->ipv6=0 . 2015.04.25 11:13:04 - OpenVPN > TAP-WIN32 device [LAN-verbinding 2] opened: \\.\Global\{C05534B7-1477-4C76-82E9-147087917E2E}.tap . 2015.04.25 11:13:04 - OpenVPN > TAP-Windows Driver Version 9.9 . 2015.04.25 11:13:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.16/255.255.0.0 [sUCCEEDED] . 2015.04.25 11:13:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.16/255.255.0.0 on interface {C05534B7-1477-4C76-82E9-147087917E2E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2015.04.25 11:13:04 - OpenVPN > Successful ARP Flush on interface [13] {C05534B7-1477-4C76-82E9-147087917E2E} . 2015.04.25 11:13:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2015.04.25 11:13:09 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.74.18 MASK 255.255.255.255 192.168.0.254 . 2015.04.25 11:13:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2015.04.25 11:13:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2015.04.25 11:13:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2015.04.25 11:13:09 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=13] . 2015.04.25 11:13:09 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2015.04.25 11:13:09 - OpenVPN > Route addition fallback to route.exe . 2015.04.25 11:13:09 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2015.04.25 11:13:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2015.04.25 11:13:09 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: Het object bestaat al. [status=5010 if_index=13] . 2015.04.25 11:13:09 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2015.04.25 11:13:09 - OpenVPN > Route addition fallback to route.exe . 2015.04.25 11:13:09 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2015.04.25 11:13:09 - Starting Management Interface . 2015.04.25 11:13:09 - OpenVPN > Initialization Sequence Completed I 2015.04.25 11:13:09 - Flushing DNS I 2015.04.25 11:13:09 - Checking route ! 2015.04.25 11:13:09 - Connected. . 2015.04.25 11:13:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2015.04.25 11:13:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info During this time there is no inactivity from my part as I was downloading files at that moment. I'm using the latest x64 Windows-client, version 2.8.8, connected thought Ethernet, nof WiFi. I see in the changelog on the website that there is a 2.9 version, but it is not available for download. The complete logfile with a couple of disconnects is attached. Does anyone have any idea why this could be happening and what I could do to fix this? Thanks. AirVPN_20150425_131905.txt
×
×
  • Create New...