Jump to content
Not connected, Your IP: 18.117.216.229

Search the Community

Showing results for tags 'iOS iPad disconnection'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 1 result

  1. I have already raised this issue with staff, but despite their feedback, I haven't been able to solve the problem. They seem to be suggesting there was a problem maintaining a wifi connection, but I have done everything I could to sort this, and I am still getting the same problem. I am posting this issue here in case anyone in the community has any ideas. Basically, the problem is that from time to time, the iPad will suddenly lose the connection to the VPN. This happens right in the middle of browsing, leaving my connection exposed. Very annoying. Can anyone see anything in the log? I'd be grateful. This is driving me crazy, and I can't get to the bottom of the problem. Thanks. nfo@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 06:46:11 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 06:46:11 Session is ACTIVE 2016-02-28 06:46:11 EVENT: GET_CONFIG 2016-02-28 06:46:11 Sending PUSH_REQUEST to server... 2016-02-28 06:46:12 Sending PUSH_REQUEST to server... 2016-02-28 06:46:13 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 06:46:13 LZO-ASYM init swap=0 asym=1 2016-02-28 06:46:13 Comp-stub init swap=0 2016-02-28 06:46:13 EVENT: ASSIGN_IP 2016-02-28 06:46:13 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 06:46:13 Connected via tun 2016-02-28 06:46:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 06:46:13 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 06:46:13 SetStatus Connected 2016-02-28 06:46:13 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 06:46:33 OS Event: SLEEP 2016-02-28 06:46:33 EVENT: PAUSE 2016-02-28 06:51:45 OS Event: WAKEUP 2016-02-28 06:51:48 RESUME TEST: ReachableViaWiFi 2016-02-28 06:51:48 EVENT: RESUME 2016-02-28 06:51:48 EVENT: RECONNECTING 2016-02-28 06:51:48 LZO-ASYM init swap=0 asym=1 2016-02-28 06:51:48 Comp-stub init swap=0 2016-02-28 06:51:48 Contacting 103.254.153.68:53 via UDP 2016-02-28 06:51:48 EVENT: WAIT 2016-02-28 06:51:48 SetTunnelSocket returned 1 2016-02-28 06:51:48 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 06:51:48 EVENT: CONNECTING 2016-02-28 06:51:48 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 06:51:48 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 06:51:48 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 06:51:48 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 06:51:51 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 06:51:51 Session is ACTIVE 2016-02-28 06:51:51 EVENT: GET_CONFIG 2016-02-28 06:51:51 Sending PUSH_REQUEST to server... 2016-02-28 06:51:52 Sending PUSH_REQUEST to server... 2016-02-28 06:51:53 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 06:51:53 LZO-ASYM init swap=0 asym=1 2016-02-28 06:51:53 Comp-stub init swap=0 2016-02-28 06:51:53 EVENT: ASSIGN_IP 2016-02-28 06:51:53 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 06:51:53 Connected via tun 2016-02-28 06:51:53 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 06:51:53 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 06:51:53 SetStatus Connected 2016-02-28 06:51:53 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 06:52:11 OS Event: SLEEP 2016-02-28 06:52:11 EVENT: PAUSE 2016-02-28 07:06:34 OS Event: WAKEUP 2016-02-28 07:06:37 RESUME TEST: ReachableViaWiFi 2016-02-28 07:06:38 EVENT: RESUME 2016-02-28 07:06:38 EVENT: RECONNECTING 2016-02-28 07:06:38 LZO-ASYM init swap=0 asym=1 2016-02-28 07:06:38 Comp-stub init swap=0 2016-02-28 07:06:38 Contacting 103.254.153.68:53 via UDP 2016-02-28 07:06:38 EVENT: WAIT 2016-02-28 07:06:38 SetTunnelSocket returned 1 2016-02-28 07:06:38 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 07:06:38 EVENT: CONNECTING 2016-02-28 07:06:38 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 07:06:38 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 07:06:38 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 07:06:38 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 07:06:41 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 07:06:41 Session is ACTIVE 2016-02-28 07:06:41 EVENT: GET_CONFIG 2016-02-28 07:06:41 Sending PUSH_REQUEST to server... 2016-02-28 07:06:42 Sending PUSH_REQUEST to server... 2016-02-28 07:06:43 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 07:06:43 LZO-ASYM init swap=0 asym=1 2016-02-28 07:06:43 Comp-stub init swap=0 2016-02-28 07:06:43 EVENT: ASSIGN_IP 2016-02-28 07:06:43 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 07:06:43 Connected via tun 2016-02-28 07:06:43 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 07:06:43 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 07:06:43 SetStatus Connected 2016-02-28 07:06:43 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 07:06:55 OS Event: SLEEP 2016-02-28 07:06:55 EVENT: PAUSE 2016-02-28 07:21:35 OS Event: WAKEUP 2016-02-28 07:21:38 RESUME TEST: ReachableViaWiFi 2016-02-28 07:21:38 EVENT: RESUME 2016-02-28 07:21:38 EVENT: RECONNECTING 2016-02-28 07:21:38 LZO-ASYM init swap=0 asym=1 2016-02-28 07:21:38 Comp-stub init swap=0 2016-02-28 07:21:38 Contacting 103.254.153.68:53 via UDP 2016-02-28 07:21:38 EVENT: WAIT 2016-02-28 07:21:38 SetTunnelSocket returned 1 2016-02-28 07:21:38 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 07:21:38 EVENT: CONNECTING 2016-02-28 07:21:38 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 07:21:38 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 07:21:38 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 07:21:38 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 07:21:41 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 07:21:41 Session is ACTIVE 2016-02-28 07:21:41 EVENT: GET_CONFIG 2016-02-28 07:21:41 Sending PUSH_REQUEST to server... 2016-02-28 07:21:42 Sending PUSH_REQUEST to server... 2016-02-28 07:21:43 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 07:21:43 LZO-ASYM init swap=0 asym=1 2016-02-28 07:21:43 Comp-stub init swap=0 2016-02-28 07:21:43 EVENT: ASSIGN_IP 2016-02-28 07:21:43 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 07:21:43 Connected via tun 2016-02-28 07:21:43 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 07:21:43 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 07:21:43 SetStatus Connected 2016-02-28 07:21:43 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 07:22:02 OS Event: SLEEP 2016-02-28 07:22:02 EVENT: PAUSE 2016-02-28 07:36:25 OS Event: WAKEUP 2016-02-28 07:36:28 RESUME TEST: ReachableViaWiFi 2016-02-28 07:36:28 EVENT: RESUME 2016-02-28 07:36:28 EVENT: RECONNECTING 2016-02-28 07:36:28 LZO-ASYM init swap=0 asym=1 2016-02-28 07:36:28 Comp-stub init swap=0 2016-02-28 07:36:28 Contacting 103.254.153.68:53 via UDP 2016-02-28 07:36:28 EVENT: WAIT 2016-02-28 07:36:28 SetTunnelSocket returned 1 2016-02-28 07:36:28 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 07:36:28 EVENT: CONNECTING 2016-02-28 07:36:28 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 07:36:28 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 07:36:28 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 07:36:28 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 07:36:31 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 07:36:31 Session is ACTIVE 2016-02-28 07:36:31 EVENT: GET_CONFIG 2016-02-28 07:36:31 Sending PUSH_REQUEST to server... 2016-02-28 07:36:32 Sending PUSH_REQUEST to server... 2016-02-28 07:36:33 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 07:36:33 LZO-ASYM init swap=0 asym=1 2016-02-28 07:36:33 Comp-stub init swap=0 2016-02-28 07:36:33 EVENT: ASSIGN_IP 2016-02-28 07:36:33 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 07:36:33 Connected via tun 2016-02-28 07:36:33 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 07:36:33 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 07:36:33 SetStatus Connected 2016-02-28 07:36:33 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 07:36:51 OS Event: SLEEP 2016-02-28 07:36:51 EVENT: PAUSE 2016-02-28 07:49:29 OS Event: WAKEUP 2016-02-28 07:49:32 RESUME TEST: ReachableViaWiFi 2016-02-28 07:49:32 EVENT: RESUME 2016-02-28 07:49:32 EVENT: RECONNECTING 2016-02-28 07:49:32 LZO-ASYM init swap=0 asym=1 2016-02-28 07:49:32 Comp-stub init swap=0 2016-02-28 07:49:32 Contacting 103.254.153.68:53 via UDP 2016-02-28 07:49:32 EVENT: WAIT 2016-02-28 07:49:32 SetTunnelSocket returned 1 2016-02-28 07:49:32 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 07:49:34 EVENT: CONNECTING 2016-02-28 07:49:34 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 07:49:34 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 07:49:34 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 07:49:34 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 07:49:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 07:49:38 Session is ACTIVE 2016-02-28 07:49:38 EVENT: GET_CONFIG 2016-02-28 07:49:38 Sending PUSH_REQUEST to server... 2016-02-28 07:49:39 Sending PUSH_REQUEST to server... 2016-02-28 07:49:39 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 07:49:39 LZO-ASYM init swap=0 asym=1 2016-02-28 07:49:39 Comp-stub init swap=0 2016-02-28 07:49:39 EVENT: ASSIGN_IP 2016-02-28 07:49:39 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 07:49:39 Connected via tun 2016-02-28 07:49:39 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 07:49:39 SetStatus Connected 2016-02-28 07:49:39 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 07:49:39 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 08:35:50 OS Event: SLEEP 2016-02-28 08:35:50 EVENT: PAUSE 2016-02-28 08:45:05 OS Event: WAKEUP 2016-02-28 08:45:08 RESUME TEST: ReachableViaWiFi 2016-02-28 08:45:08 EVENT: RESUME 2016-02-28 08:45:08 EVENT: RECONNECTING 2016-02-28 08:45:08 LZO-ASYM init swap=0 asym=1 2016-02-28 08:45:08 Comp-stub init swap=0 2016-02-28 08:45:08 Contacting 103.254.153.68:53 via UDP 2016-02-28 08:45:08 EVENT: WAIT 2016-02-28 08:45:08 SetTunnelSocket returned 1 2016-02-28 08:45:08 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 08:45:08 EVENT: CONNECTING 2016-02-28 08:45:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 08:45:08 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 08:45:08 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 08:45:08 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 08:45:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 08:45:12 Session is ACTIVE 2016-02-28 08:45:12 EVENT: GET_CONFIG 2016-02-28 08:45:12 Sending PUSH_REQUEST to server... 2016-02-28 08:45:13 Sending PUSH_REQUEST to server... 2016-02-28 08:45:13 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 08:45:13 LZO-ASYM init swap=0 asym=1 2016-02-28 08:45:13 Comp-stub init swap=0 2016-02-28 08:45:13 EVENT: ASSIGN_IP 2016-02-28 08:45:13 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 08:45:13 Connected via tun 2016-02-28 08:45:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 08:45:14 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 08:45:14 SetStatus Connected 2016-02-28 08:45:14 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 08:45:37 OS Event: SLEEP 2016-02-28 08:45:37 EVENT: PAUSE 2016-02-28 09:00:05 OS Event: WAKEUP 2016-02-28 09:00:08 RESUME TEST: ReachableViaWiFi 2016-02-28 09:00:08 EVENT: RESUME 2016-02-28 09:00:08 EVENT: RECONNECTING 2016-02-28 09:00:08 LZO-ASYM init swap=0 asym=1 2016-02-28 09:00:08 Comp-stub init swap=0 2016-02-28 09:00:08 Contacting 103.254.153.68:53 via UDP 2016-02-28 09:00:08 EVENT: WAIT 2016-02-28 09:00:08 SetTunnelSocket returned 1 2016-02-28 09:00:08 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 09:00:08 EVENT: CONNECTING 2016-02-28 09:00:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 09:00:08 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 09:00:08 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 09:00:08 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 09:00:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 09:00:12 Session is ACTIVE 2016-02-28 09:00:12 EVENT: GET_CONFIG 2016-02-28 09:00:12 Sending PUSH_REQUEST to server... 2016-02-28 09:00:13 Sending PUSH_REQUEST to server... 2016-02-28 09:00:13 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 09:00:13 LZO-ASYM init swap=0 asym=1 2016-02-28 09:00:13 Comp-stub init swap=0 2016-02-28 09:00:13 EVENT: ASSIGN_IP 2016-02-28 09:00:13 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 09:00:13 Connected via tun 2016-02-28 09:00:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 09:00:13 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 09:00:13 SetStatus Connected 2016-02-28 09:00:14 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 09:00:48 OS Event: SLEEP 2016-02-28 09:00:48 EVENT: PAUSE 2016-02-28 09:05:50 OS Event: WAKEUP 2016-02-28 09:05:53 RESUME TEST: ReachableViaWiFi 2016-02-28 09:05:53 EVENT: RESUME 2016-02-28 09:05:53 EVENT: RECONNECTING 2016-02-28 09:05:53 LZO-ASYM init swap=0 asym=1 2016-02-28 09:05:53 Comp-stub init swap=0 2016-02-28 09:05:53 Contacting 103.254.153.68:53 via UDP 2016-02-28 09:05:53 EVENT: WAIT 2016-02-28 09:05:53 SetTunnelSocket returned 1 2016-02-28 09:05:53 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 09:05:54 EVENT: CONNECTING 2016-02-28 09:05:54 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 09:05:54 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 09:05:54 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 09:05:54 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 09:05:58 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 09:05:58 Session is ACTIVE 2016-02-28 09:05:58 EVENT: GET_CONFIG 2016-02-28 09:05:58 Sending PUSH_REQUEST to server... 2016-02-28 09:05:59 Sending PUSH_REQUEST to server... 2016-02-28 09:05:59 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 09:05:59 LZO-ASYM init swap=0 asym=1 2016-02-28 09:05:59 Comp-stub init swap=0 2016-02-28 09:05:59 EVENT: ASSIGN_IP 2016-02-28 09:05:59 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 09:05:59 Connected via tun 2016-02-28 09:05:59 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 09:05:59 SetStatus Connected 2016-02-28 09:05:59 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 09:05:59 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 09:08:52 OS Event: SLEEP 2016-02-28 09:08:52 EVENT: PAUSE 2016-02-28 09:15:47 OS Event: WAKEUP 2016-02-28 09:15:50 RESUME TEST: ReachableViaWiFi 2016-02-28 09:15:50 EVENT: RESUME 2016-02-28 09:15:50 EVENT: RECONNECTING 2016-02-28 09:15:50 LZO-ASYM init swap=0 asym=1 2016-02-28 09:15:50 Comp-stub init swap=0 2016-02-28 09:15:50 Contacting 103.254.153.68:53 via UDP 2016-02-28 09:15:50 EVENT: WAIT 2016-02-28 09:15:50 SetTunnelSocket returned 1 2016-02-28 09:15:50 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 09:15:51 EVENT: CONNECTING 2016-02-28 09:15:51 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 09:15:51 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 09:15:51 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 09:15:51 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 09:15:55 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 09:15:55 Session is ACTIVE 2016-02-28 09:15:55 EVENT: GET_CONFIG 2016-02-28 09:15:55 Sending PUSH_REQUEST to server... 2016-02-28 09:15:56 Sending PUSH_REQUEST to server... 2016-02-28 09:15:56 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 09:15:56 LZO-ASYM init swap=0 asym=1 2016-02-28 09:15:56 Comp-stub init swap=0 2016-02-28 09:15:56 EVENT: ASSIGN_IP 2016-02-28 09:15:56 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 09:15:56 Connected via tun 2016-02-28 09:15:56 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 09:15:56 SetStatus Connected 2016-02-28 09:15:56 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 09:15:56 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 09:22:15 TUN reset routes 2016-02-28 09:22:15 EVENT: DISCONNECTED 2016-02-28 09:22:15 Raw stats on disconnect: BYTES_IN : 319073798 BYTES_OUT : 40229661 PACKETS_IN : 281937 PACKETS_OUT : 269449 TUN_BYTES_IN : 25882381 TUN_BYTES_OUT : 304345974 TUN_PACKETS_IN : 261187 TUN_PACKETS_OUT : 275536 HANDSHAKE_TIMEOUT : 8 KEEPALIVE_TIMEOUT : 23 N_PAUSE : 237 N_RECONNECT : 260 2016-02-28 09:22:15 Performance stats on disconnect: CPU usage (microseconds): 981251394 Tunnel compression ratio (uplink): 1.55433 Tunnel compression ratio (downlink): 1.04839 Network bytes per CPU second: 366168 Tunnel bytes per CPU second: 336537 2016-02-28 09:22:15 ----- OpenVPN Stop ----- 2016-02-28 09:22:26 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7a thumb2 32-bit 2016-02-28 09:22:26 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 2016-02-28 09:22:26 EVENT: RESOLVE 2016-02-28 09:22:31 LZO-ASYM init swap=0 asym=1 2016-02-28 09:22:31 Comp-stub init swap=0 2016-02-28 09:22:31 Contacting 71.19.252.113:53 via TCP 2016-02-28 09:22:31 EVENT: WAIT 2016-02-28 09:22:31 SetTunnelSocket returned 1 2016-02-28 09:22:31 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4 2016-02-28 09:22:32 EVENT: CONNECTING 2016-02-28 09:22:32 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 09:22:32 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 09:22:32 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 09:22:32 VERIFY OK: depth=0 cert. version : 3 serial number : DB issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:38 expires on : 2026-01-18 14:54:38 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 09:22:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 09:22:38 Session is ACTIVE 2016-02-28 09:22:38 EVENT: GET_CONFIG 2016-02-28 09:22:38 Sending PUSH_REQUEST to server... 2016-02-28 09:22:39 Sending PUSH_REQUEST to server... 2016-02-28 09:22:41 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.9.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.9.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.9.0.5] [255.255.0.0] 2016-02-28 09:22:41 LZO-ASYM init swap=0 asym=1 2016-02-28 09:22:41 Comp-stub init swap=0 2016-02-28 09:22:41 EVENT: ASSIGN_IP 2016-02-28 09:22:41 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.252.113 Tunnel Addresses: 10.9.0.5/16 -> 10.9.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.9.0.1 Search Domains: 2016-02-28 09:22:41 Connected via tun 2016-02-28 09:22:41 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/ 2016-02-28 09:22:41 SetStatus Connected 2016-02-28 09:22:41 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 09:47:41 OS Event: SLEEP 2016-02-28 09:47:41 EVENT: PAUSE 2016-02-28 10:02:00 OS Event: WAKEUP 2016-02-28 10:02:03 RESUME TEST: ReachableViaWiFi 2016-02-28 10:02:03 EVENT: RESUME 2016-02-28 10:02:03 EVENT: RECONNECTING 2016-02-28 10:02:03 LZO-ASYM init swap=0 asym=1 2016-02-28 10:02:03 Comp-stub init swap=0 2016-02-28 10:02:03 Contacting 71.19.252.113:53 via TCP 2016-02-28 10:02:03 EVENT: WAIT 2016-02-28 10:02:03 SetTunnelSocket returned 1 2016-02-28 10:02:03 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4 2016-02-28 10:02:04 EVENT: CONNECTING 2016-02-28 10:02:04 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 10:02:04 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 10:02:04 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 10:02:04 VERIFY OK: depth=0 cert. version : 3 serial number : DB issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:38 expires on : 2026-01-18 14:54:38 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 10:02:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 10:02:09 Session is ACTIVE 2016-02-28 10:02:09 EVENT: GET_CONFIG 2016-02-28 10:02:09 Sending PUSH_REQUEST to server... 2016-02-28 10:02:10 Sending PUSH_REQUEST to server... 2016-02-28 10:02:10 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.9.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.9.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.9.0.5] [255.255.0.0] 2016-02-28 10:02:10 LZO-ASYM init swap=0 asym=1 2016-02-28 10:02:10 Comp-stub init swap=0 2016-02-28 10:02:10 EVENT: ASSIGN_IP 2016-02-28 10:02:10 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.252.113 Tunnel Addresses: 10.9.0.5/16 -> 10.9.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.9.0.1 Search Domains: 2016-02-28 10:02:10 Connected via tun 2016-02-28 10:02:10 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/ 2016-02-28 10:02:11 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 10:02:11 SetStatus Connected 2016-02-28 10:02:11 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 10:02:41 OS Event: SLEEP 2016-02-28 10:02:41 EVENT: PAUSE 2016-02-28 10:21:55 OS Event: WAKEUP 2016-02-28 10:21:58 RESUME TEST: ReachableViaWiFi 2016-02-28 10:21:58 EVENT: RESUME 2016-02-28 10:21:58 EVENT: RECONNECTING 2016-02-28 10:21:58 LZO-ASYM init swap=0 asym=1 2016-02-28 10:21:58 Comp-stub init swap=0 2016-02-28 10:21:58 Contacting 71.19.252.113:53 via TCP 2016-02-28 10:21:58 EVENT: WAIT 2016-02-28 10:21:58 SetTunnelSocket returned 1 2016-02-28 10:21:58 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4 2016-02-28 10:21:59 EVENT: CONNECTING 2016-02-28 10:21:59 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 10:21:59 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 10:21:59 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 10:21:59 VERIFY OK: depth=0 cert. version : 3 serial number : DB issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:38 expires on : 2026-01-18 14:54:38 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 10:22:04 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 10:22:04 Session is ACTIVE 2016-02-28 10:22:04 EVENT: GET_CONFIG 2016-02-28 10:22:04 Sending PUSH_REQUEST to server... 2016-02-28 10:22:06 Sending PUSH_REQUEST to server... 2016-02-28 10:22:08 Sending PUSH_REQUEST to server... 2016-02-28 10:22:11 Sending PUSH_REQUEST to server... 2016-02-28 10:22:14 Sending PUSH_REQUEST to server... 2016-02-28 10:22:17 Sending PUSH_REQUEST to server... 2016-02-28 10:22:20 Sending PUSH_REQUEST to server... 2016-02-28 10:22:23 Sending PUSH_REQUEST to server... 2016-02-28 10:22:26 Sending PUSH_REQUEST to server... 2016-02-28 10:22:29 Sending PUSH_REQUEST to server... 2016-02-28 10:22:32 Sending PUSH_REQUEST to server... 2016-02-28 10:22:35 Sending PUSH_REQUEST to server... 2016-02-28 10:22:38 Sending PUSH_REQUEST to server... 2016-02-28 10:22:41 Sending PUSH_REQUEST to server... 2016-02-28 10:22:44 Sending PUSH_REQUEST to server... 2016-02-28 10:22:47 Sending PUSH_REQUEST to server... 2016-02-28 10:22:50 Sending PUSH_REQUEST to server... 2016-02-28 10:22:53 Sending PUSH_REQUEST to server... 2016-02-28 10:22:56 Sending PUSH_REQUEST to server... 2016-02-28 10:22:59 Sending PUSH_REQUEST to server... 2016-02-28 10:23:02 Sending PUSH_REQUEST to server... 2016-02-28 10:23:05 Sending PUSH_REQUEST to server... 2016-02-28 10:23:08 Sending PUSH_REQUEST to server... 2016-02-28 10:23:10 OS Event: SLEEP 2016-02-28 10:23:10 EVENT: PAUSE 2016-02-28 10:40:50 OS Event: WAKEUP 2016-02-28 10:40:53 RESUME TEST: ReachableViaWiFi 2016-02-28 10:40:53 EVENT: RESUME 2016-02-28 10:40:53 EVENT: RECONNECTING 2016-02-28 10:40:53 LZO-ASYM init swap=0 asym=1 2016-02-28 10:40:53 Comp-stub init swap=0 2016-02-28 10:40:53 Contacting 71.19.252.113:53 via TCP 2016-02-28 10:40:53 EVENT: WAIT 2016-02-28 10:40:53 SetTunnelSocket returned 1 2016-02-28 10:40:53 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4 2016-02-28 10:40:54 EVENT: CONNECTING 2016-02-28 10:40:54 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 10:40:54 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 10:40:54 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 10:40:54 VERIFY OK: depth=0 cert. version : 3 serial number : DB issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:38 expires on : 2026-01-18 14:54:38 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 10:40:59 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 10:40:59 Session is ACTIVE 2016-02-28 10:40:59 EVENT: GET_CONFIG 2016-02-28 10:40:59 Sending PUSH_REQUEST to server... 2016-02-28 10:41:00 Sending PUSH_REQUEST to server... 2016-02-28 10:41:01 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.9.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.9.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.9.0.5] [255.255.0.0] 2016-02-28 10:41:01 LZO-ASYM init swap=0 asym=1 2016-02-28 10:41:01 Comp-stub init swap=0 2016-02-28 10:41:01 EVENT: ASSIGN_IP 2016-02-28 10:41:01 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.252.113 Tunnel Addresses: 10.9.0.5/16 -> 10.9.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.9.0.1 Search Domains: 2016-02-28 10:41:01 Connected via tun 2016-02-28 10:41:01 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/ 2016-02-28 10:41:01 SetStatus Connected 2016-02-28 10:41:01 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 10:41:01 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 10:42:13 OS Event: SLEEP 2016-02-28 10:42:13 EVENT: PAUSE 2016-02-28 10:47:30 OS Event: WAKEUP 2016-02-28 10:47:33 RESUME TEST: ReachableViaWiFi 2016-02-28 10:47:33 EVENT: RESUME 2016-02-28 10:47:33 EVENT: RECONNECTING 2016-02-28 10:47:33 LZO-ASYM init swap=0 asym=1 2016-02-28 10:47:33 Comp-stub init swap=0 2016-02-28 10:47:33 Contacting 71.19.252.113:53 via TCP 2016-02-28 10:47:33 EVENT: WAIT 2016-02-28 10:47:33 SetTunnelSocket returned 1 2016-02-28 10:47:33 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4 2016-02-28 10:47:34 EVENT: CONNECTING 2016-02-28 10:47:34 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 10:47:34 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 10:47:34 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 10:47:34 VERIFY OK: depth=0 cert. version : 3 serial number : DB issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:38 expires on : 2026-01-18 14:54:38 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 10:47:40 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 10:47:40 Session is ACTIVE 2016-02-28 10:47:40 EVENT: GET_CONFIG 2016-02-28 10:47:40 Sending PUSH_REQUEST to server... 2016-02-28 10:47:41 Sending PUSH_REQUEST to server... 2016-02-28 10:47:42 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.9.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.9.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.9.0.5] [255.255.0.0] 2016-02-28 10:47:42 LZO-ASYM init swap=0 asym=1 2016-02-28 10:47:42 Comp-stub init swap=0 2016-02-28 10:47:42 EVENT: ASSIGN_IP 2016-02-28 10:47:42 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.252.113 Tunnel Addresses: 10.9.0.5/16 -> 10.9.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.9.0.1 Search Domains: 2016-02-28 10:47:42 Connected via tun 2016-02-28 10:47:42 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/ 2016-02-28 10:47:42 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 10:47:42 SetStatus Connected 2016-02-28 10:47:43 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 11:12:06 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7a thumb2 32-bit 2016-02-28 11:12:07 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 2016-02-28 11:12:07 EVENT: RESOLVE 2016-02-28 11:12:08 LZO-ASYM init swap=0 asym=1 2016-02-28 11:12:08 Comp-stub init swap=0 2016-02-28 11:12:08 Contacting 71.19.251.247:53 via TCP 2016-02-28 11:12:08 EVENT: WAIT 2016-02-28 11:12:08 SetTunnelSocket returned 1 2016-02-28 11:12:08 Connecting to ca.vpn.airdns.org:53 (71.19.251.247) via TCPv4 2016-02-28 11:12:08 EVENT: CONNECTING 2016-02-28 11:12:08 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 11:12:08 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 11:12:09 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 11:12:09 VERIFY OK: depth=0 cert. version : 3 serial number : E1 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:55:10 expires on : 2026-01-18 14:55:10 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 11:12:14 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 11:12:14 Session is ACTIVE 2016-02-28 11:12:14 EVENT: GET_CONFIG 2016-02-28 11:12:14 Sending PUSH_REQUEST to server... 2016-02-28 11:12:15 Sending PUSH_REQUEST to server... 2016-02-28 11:12:15 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.9.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.9.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.9.0.4] [255.255.0.0] 2016-02-28 11:12:15 LZO-ASYM init swap=0 asym=1 2016-02-28 11:12:15 Comp-stub init swap=0 2016-02-28 11:12:15 EVENT: ASSIGN_IP 2016-02-28 11:12:15 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.251.247 Tunnel Addresses: 10.9.0.4/16 -> 10.9.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.9.0.1 Search Domains: 2016-02-28 11:12:15 Connected via tun 2016-02-28 11:12:15 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.251.247) via /TCPv4 on tun/10.9.0.4/ 2016-02-28 11:12:15 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 11:12:15 SetStatus Connected 2016-02-28 11:48:30 TUN reset routes 2016-02-28 11:48:30 EVENT: DISCONNECTED 2016-02-28 11:48:30 Raw stats on disconnect: BYTES_IN : 33597104 BYTES_OUT : 4875026 PACKETS_IN : 23379 PACKETS_OUT : 30890 TUN_BYTES_IN : 3423065 TUN_BYTES_OUT : 31944426 TUN_PACKETS_IN : 30853 TUN_PACKETS_OUT : 32136 2016-02-28 11:48:30 Performance stats on disconnect: CPU usage (microseconds): 20836836 Tunnel compression ratio (uplink): 1.42417 Tunnel compression ratio (downlink): 1.05174 Network bytes per CPU second: 1846351 Tunnel bytes per CPU second: 1697354 2016-02-28 11:48:30 ----- OpenVPN Stop ----- 2016-02-28 11:48:42 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7a thumb2 32-bit 2016-02-28 11:48:42 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [explicit-exit-notify] [5] 2016-02-28 11:48:42 EVENT: RESOLVE 2016-02-28 11:48:44 LZO-ASYM init swap=0 asym=1 2016-02-28 11:48:44 Comp-stub init swap=0 2016-02-28 11:48:44 Contacting 71.19.252.21:53 via UDP 2016-02-28 11:48:44 EVENT: WAIT 2016-02-28 11:48:44 SetTunnelSocket returned 1 2016-02-28 11:48:44 Connecting to ca.vpn.airdns.org:53 (71.19.252.21) via UDPv4 2016-02-28 11:48:45 EVENT: CONNECTING 2016-02-28 11:48:45 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 11:48:45 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 11:48:45 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 11:48:45 VERIFY OK: depth=0 cert. version : 3 serial number : DA issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-01-21 14:54:33 expires on : 2026-01-18 14:54:33 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 11:48:49 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 11:48:49 Session is ACTIVE 2016-02-28 11:48:49 EVENT: GET_CONFIG 2016-02-28 11:48:49 Sending PUSH_REQUEST to server... 2016-02-28 11:48:50 Sending PUSH_REQUEST to server... 2016-02-28 11:48:50 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.19] [255.255.0.0] 2016-02-28 11:48:50 LZO-ASYM init swap=0 asym=1 2016-02-28 11:48:50 Comp-stub init swap=0 2016-02-28 11:48:50 EVENT: ASSIGN_IP 2016-02-28 11:48:50 TunPersist: saving tun context: Session Name: ca.vpn.airdns.org Remote Address: 71.19.252.21 Tunnel Addresses: 10.8.0.19/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 11:48:50 Connected via tun 2016-02-28 11:48:50 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.21) via /UDPv4 on tun/10.8.0.19/ 2016-02-28 11:48:50 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 11:48:50 SetStatus Connected 2016-02-28 11:52:00 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7a thumb2 32-bit 2016-02-28 11:52:00 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [explicit-exit-notify] [5] 2016-02-28 11:52:00 EVENT: RESOLVE 2016-02-28 11:52:04 LZO-ASYM init swap=0 asym=1 2016-02-28 11:52:04 Comp-stub init swap=0 2016-02-28 11:52:04 Contacting 103.254.153.68:53 via UDP 2016-02-28 11:52:04 EVENT: WAIT 2016-02-28 11:52:04 SetTunnelSocket returned 1 2016-02-28 11:52:04 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 11:52:04 EVENT: CONNECTING 2016-02-28 11:52:04 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 11:52:04 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 11:52:08 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 11:52:08 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 11:52:14 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 11:52:14 Session is ACTIVE 2016-02-28 11:52:14 EVENT: GET_CONFIG 2016-02-28 11:52:14 Sending PUSH_REQUEST to server... 2016-02-28 11:52:15 Sending PUSH_REQUEST to server... 2016-02-28 11:52:15 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 11:52:15 LZO-ASYM init swap=0 asym=1 2016-02-28 11:52:15 Comp-stub init swap=0 2016-02-28 11:52:15 EVENT: ASSIGN_IP 2016-02-28 11:52:15 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 11:52:15 Connected via tun 2016-02-28 11:52:15 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 11:52:15 SetStatus Connected 2016-02-28 11:52:15 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 11:58:02 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7a thumb2 32-bit 2016-02-28 11:58:02 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [explicit-exit-notify] [5] 2016-02-28 11:58:02 EVENT: RESOLVE 2016-02-28 11:58:04 LZO-ASYM init swap=0 asym=1 2016-02-28 11:58:04 Comp-stub init swap=0 2016-02-28 11:58:04 Contacting 103.254.153.68:53 via UDP 2016-02-28 11:58:04 EVENT: WAIT 2016-02-28 11:58:04 SetTunnelSocket returned 1 2016-02-28 11:58:04 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 11:58:05 EVENT: CONNECTING 2016-02-28 11:58:05 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 11:58:05 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 11:58:05 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 11:58:05 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 11:58:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 11:58:09 Session is ACTIVE 2016-02-28 11:58:09 EVENT: GET_CONFIG 2016-02-28 11:58:09 Sending PUSH_REQUEST to server... 2016-02-28 11:58:10 Sending PUSH_REQUEST to server... 2016-02-28 11:58:11 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 11:58:11 LZO-ASYM init swap=0 asym=1 2016-02-28 11:58:11 Comp-stub init swap=0 2016-02-28 11:58:11 EVENT: ASSIGN_IP 2016-02-28 11:58:11 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 11:58:11 Connected via tun 2016-02-28 11:58:11 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 11:58:11 NET Internet:ReachableViaWiFi/-R t----l- 2016-02-28 11:58:11 SetStatus Connected 2016-02-28 12:03:32 OS Event: SLEEP 2016-02-28 12:03:32 EVENT: PAUSE 2016-02-28 12:08:11 OS Event: WAKEUP 2016-02-28 12:08:14 RESUME TEST: ReachableViaWiFi 2016-02-28 12:08:14 EVENT: RESUME 2016-02-28 12:08:14 EVENT: RECONNECTING 2016-02-28 12:08:14 LZO-ASYM init swap=0 asym=1 2016-02-28 12:08:14 Comp-stub init swap=0 2016-02-28 12:08:14 Contacting 103.254.153.68:53 via UDP 2016-02-28 12:08:14 EVENT: WAIT 2016-02-28 12:08:14 SetTunnelSocket returned 1 2016-02-28 12:08:14 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4 2016-02-28 12:08:14 EVENT: CONNECTING 2016-02-28 12:08:14 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-02-28 12:08:14 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-02-28 12:08:15 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-02-28 12:08:15 VERIFY OK: depth=0 cert. version : 3 serial number : 5F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-08-20 11:25:25 expires on : 2024-08-17 11:25:25 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-02-28 12:08:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-02-28 12:08:19 Session is ACTIVE 2016-02-28 12:08:19 EVENT: GET_CONFIG 2016-02-28 12:08:19 Sending PUSH_REQUEST to server... 2016-02-28 12:08:20 Sending PUSH_REQUEST to server... 2016-02-28 12:08:20 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.8.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.8.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.8.0.17] [255.255.0.0] 2016-02-28 12:08:20 LZO-ASYM init swap=0 asym=1 2016-02-28 12:08:20 Comp-stub init swap=0 2016-02-28 12:08:20 EVENT: ASSIGN_IP 2016-02-28 12:08:20 TunPersist: saving tun context: Session Name: asia.vpn.airdns.org Remote Address: 103.254.153.68 Tunnel Addresses: 10.8.0.17/16 -> 10.8.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.8.0.1 Search Domains: 2016-02-28 12:08:20 Connected via tun 2016-02-28 12:08:20 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/ 2016-02-28 12:08:20 NET Internet:ReachableViaWiFi/-R -----l- 2016-02-28 12:08:20 SetStatus Connected 2016-02-28 12:08:20 NET Internet:ReachableViaWiFi/-R t----l-
×
×
  • Create New...