Search the Community
Showing results for tags 'ipleak connect'.
Found 1 result
-
Hey everyone, Quite new to vpn's and so far really happy with airvpn! However, I'm experiencing a small problem: i cant connect to ipleak.net anymore. Before I could, but I was having the disconnection problem whenever i was not connected to eddie. Changed the DNS to automatic in ipv4. Solved the first problem but now i cant connect to ipleak.net anymore. Not a major problem, but it stops me from being able to check if everything works as intended. Any fixes for this? Logs below I 2017.02.01 14:06:12 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2017.02.01 14:06:12 - Reading options from C:\Users\UN\AppData\Local\AirVPN\AirVPN.xml. 2017.02.01 14:06:12 - Data Path: C:\Users\UN\AppData\Local\AirVPN. 2017.02.01 14:06:12 - App Path: E:\Programmas\AirVPN. 2017.02.01 14:06:12 - Executable Path: E:\Programmas\AirVPN\AirVPN.exe. 2017.02.01 14:06:12 - Command line arguments (1): path="home". 2017.02.01 14:06:12 - Operating System: Microsoft Windows NT 6.2.9200.0. 2017.02.01 14:06:12 - Updating systems & servers data .... 2017.02.01 14:06:12 - Systems & servers data update completedI 2017.02.01 14:06:14 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2017.02.01 14:06:14 - OpenVPN - Version: OpenVPN 2.3.8 (E:\Programmas\AirVPN\openvpn.exe)I 2017.02.01 14:06:14 - SSH - Version: plink 0.63 (E:\Programmas\AirVPN\plink.exe)I 2017.02.01 14:06:14 - SSL - Version: stunnel 5.17 (E:\Programmas\AirVPN\stunnel.exe)I 2017.02.01 14:06:14 - Session starting.I 2017.02.01 14:06:14 - IPv6 disabled.I 2017.02.01 14:06:21 - Checking authorization ...! 2017.02.01 14:06:21 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:06:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:06:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:06:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:06:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:06:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:06:21 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:06:21 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:06:21 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=ada043d8 29fd34f0. 2017.02.01 14:06:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:06:21 - OpenVPN > Validating certificate key usage. 2017.02.01 14:06:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:06:21 - OpenVPN > VERIFY KU OK. 2017.02.01 14:06:21 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:06:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:06:21 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:06:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:06:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:06:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:06:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:06:22 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:06:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:06:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:06:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:06:24 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:06:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:06:24 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:06:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:06:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:06:24 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:06:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - Starting Management Interface. 2017.02.01 14:06:29 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:06:29 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:06:29 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:06:30 - Flushing DNSI 2017.02.01 14:06:30 - Checking routeI 2017.02.01 14:06:54 - Checking DNS! 2017.02.01 14:06:54 - Connected.. 2017.02.01 14:06:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:06:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:06:54 - Disconnecting. 2017.02.01 14:06:54 - Management - Send 'signal SIGTERM'. 2017.02.01 14:06:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:06:54 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:06:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:06:59 - Connection terminated.I 2017.02.01 14:06:59 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:06:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:06:59 - IPv6 restored.! 2017.02.01 14:06:59 - Session terminated.I 2017.02.01 14:07:23 - Session starting.I 2017.02.01 14:07:23 - IPv6 disabled.I 2017.02.01 14:07:23 - Checking authorization ...! 2017.02.01 14:07:23 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:07:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:07:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:07:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:07:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:07:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:07:24 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:07:24 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:07:24 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=c5d35201 5082ec58. 2017.02.01 14:07:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:07:24 - OpenVPN > Validating certificate key usage. 2017.02.01 14:07:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:07:24 - OpenVPN > VERIFY KU OK. 2017.02.01 14:07:24 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:07:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:07:24 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:07:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:07:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:07:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:07:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:07:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:07:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:07:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:07:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:07:26 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:07:26 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:07:26 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:07:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:07:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:07:26 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:07:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - Starting Management Interface. 2017.02.01 14:07:31 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:07:31 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:07:31 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:07:31 - Flushing DNSI 2017.02.01 14:07:31 - Checking routeI 2017.02.01 14:07:43 - Checking DNS! 2017.02.01 14:07:43 - Connected.. 2017.02.01 14:07:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:07:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:17:36 - Disconnecting. 2017.02.01 14:17:36 - Management - Send 'signal SIGTERM'. 2017.02.01 14:17:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:17:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:17:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:17:41 - Connection terminated.I 2017.02.01 14:17:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:17:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:17:41 - IPv6 restored.! 2017.02.01 14:17:41 - Session terminated.I 2017.02.01 14:18:31 - Session starting.I 2017.02.01 14:18:31 - IPv6 disabled.I 2017.02.01 14:18:31 - Checking authorization ...! 2017.02.01 14:18:31 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:18:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:18:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:18:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:18:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:18:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:18:32 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:18:32 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:18:32 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=945951cf 3d52a05f. 2017.02.01 14:18:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:18:32 - OpenVPN > Validating certificate key usage. 2017.02.01 14:18:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:18:32 - OpenVPN > VERIFY KU OK. 2017.02.01 14:18:32 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:18:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:18:32 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:18:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:18:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:18:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:18:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:18:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:18:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:18:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:18:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:18:34 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:18:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:18:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:18:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:18:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:18:34 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:18:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - Starting Management Interface. 2017.02.01 14:18:39 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:18:39 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:18:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:18:39 - Flushing DNSI 2017.02.01 14:18:39 - Checking routeI 2017.02.01 14:19:03 - Checking DNS! 2017.02.01 14:19:03 - Connected.. 2017.02.01 14:19:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:19:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:27:27 - Disconnecting. 2017.02.01 14:27:27 - Management - Send 'signal SIGTERM'. 2017.02.01 14:27:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:27:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:27:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:27:33 - Connection terminated.I 2017.02.01 14:27:33 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:27:33 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:27:33 - IPv6 restored.! 2017.02.01 14:27:33 - Session terminated.I 2017.02.01 14:27:52 - Session starting.I 2017.02.01 14:27:52 - IPv6 disabled.I 2017.02.01 14:27:52 - Checking authorization ...! 2017.02.01 14:27:52 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:27:52 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:27:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:27:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:27:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:27:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:27:52 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:27:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:27:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=feb214e7 4e82901d. 2017.02.01 14:27:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:27:52 - OpenVPN > Validating certificate key usage. 2017.02.01 14:27:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:27:52 - OpenVPN > VERIFY KU OK. 2017.02.01 14:27:52 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:27:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:27:52 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:27:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:27:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:27:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:27:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:27:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:27:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:27:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:27:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:27:55 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:27:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:27:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:27:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:27:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:27:55 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:28:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - Starting Management Interface. 2017.02.01 14:28:00 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:28:00 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:28:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:28:00 - Flushing DNSI 2017.02.01 14:28:01 - Checking routeI 2017.02.01 14:28:25 - Checking DNS! 2017.02.01 14:28:25 - Connected.. 2017.02.01 14:28:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:28:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:32:10 - Disconnecting. 2017.02.01 14:32:10 - Management - Send 'signal SIGTERM'. 2017.02.01 14:32:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:32:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:32:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:32:15 - Connection terminated.I 2017.02.01 14:32:15 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:32:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:32:15 - IPv6 restored.! 2017.02.01 14:32:15 - Session terminated.I 2017.02.01 14:32:45 - Session starting.I 2017.02.01 14:32:45 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:32:48 - IPv6 disabled.I 2017.02.01 14:32:48 - Checking authorization ...! 2017.02.01 14:32:49 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:32:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:32:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:32:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:32:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:32:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:32:49 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:32:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:32:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=ffa0e609 c14e2e60. 2017.02.01 14:32:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:32:49 - OpenVPN > Validating certificate key usage. 2017.02.01 14:32:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:32:49 - OpenVPN > VERIFY KU OK. 2017.02.01 14:32:49 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:32:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:32:49 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:32:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:32:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:32:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:32:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:32:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:32:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:32:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:32:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:32:51 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:32:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:32:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:32:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:32:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:32:51 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:32:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - Starting Management Interface. 2017.02.01 14:32:56 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:32:56 - Flushing DNSI 2017.02.01 14:32:56 - Checking routeI 2017.02.01 14:33:20 - Checking DNS! 2017.02.01 14:33:32 - Connected.. 2017.02.01 14:33:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:33:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:34:15 - Disconnecting. 2017.02.01 14:34:15 - Management - Send 'signal SIGTERM'. 2017.02.01 14:34:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:34:15 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:34:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:34:20 - Connection terminated.I 2017.02.01 14:34:20 - IPv6 restored.I 2017.02.01 14:34:20 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:34:20 - Session terminated.I 2017.02.01 14:35:03 - Session starting.I 2017.02.01 14:35:03 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:35:06 - IPv6 disabled.I 2017.02.01 14:35:06 - Checking authorization ...! 2017.02.01 14:35:06 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:35:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:35:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:35:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:35:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:35:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:35:06 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:35:06 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:35:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=e381584b 6a77185b. 2017.02.01 14:35:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:35:06 - OpenVPN > Validating certificate key usage. 2017.02.01 14:35:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:35:06 - OpenVPN > VERIFY KU OK. 2017.02.01 14:35:06 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:35:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:35:06 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:35:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:35:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:35:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:35:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:35:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:35:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:35:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:35:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:35:11 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:35:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:35:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:35:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:35:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:35:11 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:35:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - Starting Management Interface. 2017.02.01 14:35:16 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:35:16 - Flushing DNSI 2017.02.01 14:35:16 - Checking routeI 2017.02.01 14:35:40 - Checking DNS! 2017.02.01 14:35:52 - Connected.. 2017.02.01 14:35:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:35:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.02.01 14:37:03 - Updating systems & servers data .... 2017.02.01 14:37:04 - Systems & servers data update completed. 2017.02.01 14:37:25 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)! 2017.02.01 14:37:40 - Disconnecting. 2017.02.01 14:37:40 - Management - Send 'signal SIGTERM'. 2017.02.01 14:37:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:37:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:37:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:37:45 - Connection terminated.I 2017.02.01 14:37:45 - IPv6 restored.I 2017.02.01 14:37:45 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:37:45 - Session terminated.I 2017.02.01 14:38:47 - Session starting.I 2017.02.01 14:38:47 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:38:50 - IPv6 disabled.I 2017.02.01 14:38:50 - Checking authorization ...W 2017.02.01 14:38:50 - Authorization check failed, continue anyway ({1])! 2017.02.01 14:38:50 - Connecting to Kajam (Netherlands, Alblasserdam). 2017.02.01 14:38:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:38:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:38:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:38:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:38:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:38:50 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:38:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.84:443. 2017.02.01 14:38:52 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065). 2017.02.01 14:38:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=b130682f b17a1c7d. 2017.02.01 14:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:38:52 - OpenVPN > Validating certificate key usage. 2017.02.01 14:38:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:38:52 - OpenVPN > VERIFY KU OK. 2017.02.01 14:38:52 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:38:52 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org. 2017.02.01 14:38:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:38:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:38:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:38:52 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.84:443. 2017.02.01 14:38:55 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:38:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.42 255.255.0.0,peer-id 38'. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2017.02.01 14:38:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:38:55 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:38:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:38:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:38:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.42/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:38:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.42/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:38:55 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:39:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - Starting Management Interface. 2017.02.01 14:39:00 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:39:00 - Flushing DNSI 2017.02.01 14:39:00 - Checking routeI 2017.02.01 14:39:00 - Checking DNS! 2017.02.01 14:39:00 - Connected.. 2017.02.01 14:39:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:39:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:45:21 - Disconnecting. 2017.02.01 14:45:21 - Management - Send 'signal SIGTERM'. 2017.02.01 14:45:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:45:21 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:45:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:45:26 - Connection terminated.I 2017.02.01 14:45:26 - IPv6 restored.I 2017.02.01 14:45:26 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:45:26 - Session terminated.I 2017.02.01 14:45:41 - Session starting.I 2017.02.01 14:45:41 - IPv6 disabled.I 2017.02.01 14:45:41 - Checking authorization ...! 2017.02.01 14:45:41 - Connecting to Alphard (Netherlands, Alblasserdam). 2017.02.01 14:45:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:45:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:45:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:45:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:45:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:45:41 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:45:41 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.9:443. 2017.02.01 14:45:41 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=c4fc16cc f8457ea2. 2017.02.01 14:45:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:45:41 - OpenVPN > Validating certificate key usage. 2017.02.01 14:45:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:45:41 - OpenVPN > VERIFY KU OK. 2017.02.01 14:45:41 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:45:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:45:41 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:45:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:45:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:45:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:45:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:45:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443. 2017.02.01 14:45:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:45:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.66.235 255.255.0.0'. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:45:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:45:45 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:45:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:45:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:45:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.66.235/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:45:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.66.235/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:45:45 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:45:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - Starting Management Interface. 2017.02.01 14:45:50 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:45:50 - Flushing DNSI 2017.02.01 14:45:50 - Checking routeI 2017.02.01 14:45:50 - Checking DNS! 2017.02.01 14:45:50 - Connected.. 2017.02.01 14:45:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:45:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info