Search the Community
Showing results for tags 'loop'.
Found 10 results
-
Hi I haven't used Eddie in awhile, and today when I tried to connect to a server it keeps disconnecting and retrying. I saw that some others solved this problem by going to the Eddie setup and entering a new value "eddie" but I am on MacOS and there's no place to do that on that network section. I am running the latest beta of Sequoia 15.1 maybe that's the problem? I'll include my log file if anyone could help that would awesome Thanks in advance Eddie System/Environment Report - 9/22/2024 - 6:57 PM UTC Eddie version: 2.21.8 Eddie OS build: macos_x64 Eddie architecture: x64 OS type: MacOS OS name: macOS 15.1 OS version: 15.1 (Build 24B5046f) OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 - 22 March 2022 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/hummingbird) WireGuard: 1.0.20200827 SSH: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh) SSL: stunnel 5.56 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/stunnel) Profile path: /Users/stevenlopes/.config/eddie/default.profile Data path: /Users/stevenlopes/.config/eddie Application path: /Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS Executable path: /Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/Eddie Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 192.168.50.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 106 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.locklast: True areas.allowlist: ch,ca,se,us,nl,no netlock.mode: osx_pf ui.unit: bytes ---------------------------- Logs: . 2024.09.22 14:55:44 - Eddie version: 2.21.8 / macos_x64, System: MacOS, Name: macOS 15.1, Version: 15.1 (Build 24B5046f), Mono/.Net: v4.0.30319 . 2024.09.22 14:55:44 - Raise system privileges . 2024.09.22 14:55:55 - Reading options from /Users/stevenlopes/.config/eddie/default.profile . 2024.09.22 14:55:58 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/openvpn) . 2024.09.22 14:55:58 - SSH - Version: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh) . 2024.09.22 14:55:58 - SSL - Version: stunnel 5.56 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/stunnel) I 2024.09.22 14:55:58 - Ready . 2024.09.22 14:55:59 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "expire": "", "flags": "UGScg", "gateway": "192.168.50.1", "interface": "en0", "mtu": "1500", "refs": "241", "rt_ifa": "192.168.50.90", "use": "735" }, { "destination": "127", "expire": "", "flags": "UCS", "gateway": "127.0.0.1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "127.0.0.1", "use": "0" }, { "destination": "127.0.0.1\/32", "expire": "", "flags": "UH", "gateway": "127.0.0.1", "interface": "lo0", "mtu": "16384", "refs": "12", "rt_ifa": "127.0.0.1", "use": "8314" }, { "destination": "169.254\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "7", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.1\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.1\/32", "expire": "1188", "flags": "UHLWIir", "gateway": "3c:7c:3f:cf:83:a0", "interface": "en0", "mtu": "1500", "refs": "240", "rt_ifa": "192.168.50.90", "use": "305" }, { "destination": "192.168.50.89\/32", "expire": "1183", "flags": "UHLWI", "gateway": "80:76:c2:8a:22:14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.90\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.135\/32", "expire": "1194", "flags": "UHLWI", "gateway": "d0:3f:27:36:2a:0", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.151\/32", "expire": "1014", "flags": "UHLWI", "gateway": "b0:f7:c4:37:b5:1c", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.153\/32", "expire": "1174", "flags": "UHLWIi", "gateway": "10:bf:48:8d:83:77", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "30" }, { "destination": "192.168.50.175\/32", "expire": "898", "flags": "UHLWI", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "2" }, { "destination": "192.168.50.239\/32", "expire": "1200", "flags": "UHLWI", "gateway": "46:ae:30:6f:47:6b", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.255\/32", "expire": "!", "flags": "UHLWbI", "gateway": "ff:ff:ff:ff:ff:ff", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "28" }, { "destination": "224.0.0\/4", "expire": "!", "flags": "UmCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "224.0.0.251\/32", "expire": "", "flags": "UHmLWI", "gateway": "1:0:5e:0:0:fb", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "255.255.255.255\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "2607:fb90:fa78:8400::", "interface": "ipsec0", "mtu": "1500", "refs": "8", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "14" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "::1\/128", "expire": "", "flags": "UHL", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "1", "rt_ifa": "::1", "use": "14" }, { "destination": "2607:fb90:fa78:8400::\/64", "expire": "", "flags": "Uc", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "2607:fb90:fa78:8400:39bc:43b9:150:2e0d\/128", "expire": "", "flags": "UHL", "gateway": "link#22", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "2607:fb90:fa78:8400:39bc:43b9:150:2e0d", "use": "0" }, { "destination": "fda3:94bc:bece:1::\/64", "expire": "", "flags": "UGc", "gateway": "fe80::b2f7:c4ff:fe37:b51c", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fdbe:42cd:d28d:901e::\/64", "expire": "", "flags": "UC", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fdbe:42cd:d28d:901e:ca4:37c9:4d0b:8648\/128", "expire": "", "flags": "UHLWI", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "3" }, { "destination": "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765\/128", "expire": "", "flags": "UHL", "gateway": "7a:af:8f:b3:16:8c", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::1", "interface": "lo0", "mtu": "16384", "refs": "1", "rt_ifa": "fe80::1%lo0", "use": "0" }, { "destination": "fe80::1\/128", "expire": "", "flags": "UHLI", "gateway": "link#1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::1%lo0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "5", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::8ad:89cb:b422:4599\/128", "expire": "", "flags": "UHLWI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::8b9:5496:6228:6c10\/128", "expire": "", "flags": "UHLWIi", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "3", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "253" }, { "destination": "fe80::108d:d4d2:9644:b531\/128", "expire": "", "flags": "UHLI", "gateway": "7a:af:8f:b3:16:8c", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::26ce:33ff:fea7:fa72\/128", "expire": "", "flags": "UHLWI", "gateway": "24:ce:33:a7:fa:72", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::b2f7:c4ff:fe37:b51c\/128", "expire": "", "flags": "UHLWIi", "gateway": "b0:f7:c4:37:b5:1c", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::bcc8:37ff:fe53:ae24\/128", "expire": "", "flags": "UHLI", "gateway": "be:c8:37:53:ae:24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::bcc8:37ff:fe53:ae24%awdl0", "use": "0" }, { "destination": "fe80::bcc8:37ff:fe53:ae24\/128", "expire": "", "flags": "UHLI", "gateway": "be:c8:37:53:ae:24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::bcc8:37ff:fe53:ae24%llw0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "fe80::f92c:c871:5509:3882\/128", "expire": "", "flags": "UHLI", "gateway": "link#18", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "fe80::10a0:cf3e:5ac7:d00b\/128", "expire": "", "flags": "UHLI", "gateway": "link#19", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "2", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "fe80::e570:11df:3beb:8b1e\/128", "expire": "", "flags": "UHLI", "gateway": "link#20", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "2", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "fe80::ce81:b1c:bd2c:69e\/128", "expire": "", "flags": "UHLI", "gateway": "link#21", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "1", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "fe80::8837:95aa:2539:811\/128", "expire": "", "flags": "UHLI", "gateway": "link#22", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "fe80::a413:c8c1:3fc5:9f31\/128", "expire": "", "flags": "UHLI", "gateway": "link#23", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "3", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "fe80::cd04:9da8:3f24:8331\/128", "expire": "", "flags": "UHLI", "gateway": "link#24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "fe80::692c:ec4b:d7ab:9195\/128", "expire": "", "flags": "UHLI", "gateway": "link#25", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#16", "interface": "awdl0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::10a8:85ff:fe44:1984%awdl0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#17", "interface": "llw0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::10a8:85ff:fe44:1984%llw0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" } ], "ipv4-default-gateway": "192.168.50.1", "ipv4-default-interface": "en0", "ipv6-default-gateway": "fe80::", "ipv6-default-interface": "utun0", "interfaces": [ { "friendly": "lo0", "id": "lo0", "name": "lo0", "description": "lo0", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1", "fe80::1" ], "bind": true }, { "friendly": "gif0", "id": "gif0", "name": "gif0", "description": "gif0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "stf0", "id": "stf0", "name": "stf0", "description": "stf0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi2", "id": "anpi2", "name": "anpi2", "description": "anpi2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi0", "id": "anpi0", "name": "anpi0", "description": "anpi0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi1", "id": "anpi1", "name": "anpi1", "description": "anpi1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en4)", "id": "en4", "name": "en4", "description": "en4", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en5)", "id": "en5", "name": "en5", "description": "en5", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en6)", "id": "en6", "name": "en6", "description": "en6", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 1", "id": "en1", "name": "en1", "description": "en1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 2", "id": "en2", "name": "en2", "description": "en2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 3", "id": "en3", "name": "en3", "description": "en3", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "ap1", "id": "ap1", "name": "ap1", "description": "ap1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Wi-Fi", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::108d:d4d2:9644:b531", "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765", "192.168.50.90" ], "bind": true }, { "friendly": "Thunderbolt Bridge", "id": "bridge0", "name": "bridge0", "description": "bridge0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "awdl0", "id": "awdl0", "name": "awdl0", "description": "awdl0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::bcc8:37ff:fe53:ae24" ], "bind": true }, { "friendly": "llw0", "id": "llw0", "name": "llw0", "description": "llw0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::bcc8:37ff:fe53:ae24" ], "bind": true }, { "friendly": "utun0", "id": "utun0", "name": "utun0", "description": "utun0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f92c:c871:5509:3882" ], "bind": true }, { "friendly": "utun1", "id": "utun1", "name": "utun1", "description": "utun1", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::10a0:cf3e:5ac7:d00b" ], "bind": true }, { "friendly": "utun2", "id": "utun2", "name": "utun2", "description": "utun2", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::e570:11df:3beb:8b1e" ], "bind": true }, { "friendly": "utun3", "id": "utun3", "name": "utun3", "description": "utun3", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ce81:b1c:bd2c:69e" ], "bind": true }, { "friendly": "ipsec0", "id": "ipsec0", "name": "ipsec0", "description": "ipsec0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8837:95aa:2539:811", "2607:fb90:fa78:8400:39bc:43b9:150:2e0d" ], "bind": true }, { "friendly": "utun4", "id": "utun4", "name": "utun4", "description": "utun4", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a413:c8c1:3fc5:9f31" ], "bind": true }, { "friendly": "utun5", "id": "utun5", "name": "utun5", "description": "utun5", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::cd04:9da8:3f24:8331" ], "bind": true }, { "friendly": "utun6", "id": "utun6", "name": "utun6", "description": "utun6", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::692c:ec4b:d7ab:9195" ], "bind": true } ] } ---------------------------- ifconfig: lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=201<PERFORMNUD,DAD> gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 anpi2: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:92 media: none status: inactive anpi0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:90 media: none status: inactive anpi1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:91 media: none status: inactive en4: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:70 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:71 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en6: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:72 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c0 media: autoselect <full-duplex> status: inactive en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c4 media: autoselect <full-duplex> status: inactive en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c8 media: autoselect <full-duplex> status: inactive ap1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether a6:17:6d:71:0f:bd nd6 options=201<PERFORMNUD,DAD> media: autoselect (none) status: inactive en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether 7a:af:8f:b3:16:8c inet6 fe80::108d:d4d2:9644:b531%en0 prefixlen 64 secured scopeid 0xe inet6 fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765 prefixlen 64 autoconf secured inet 192.168.50.90 netmask 0xffffff00 broadcast 192.168.50.255 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=63<RXCSUM,TXCSUM,TSO4,TSO6> ether 36:07:d0:2c:3c:c0 Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x0 member: en1 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 10 priority 0 path cost 0 member: en2 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 11 priority 0 path cost 0 member: en3 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 12 priority 0 path cost 0 nd6 options=201<PERFORMNUD,DAD> media: <unknown type> status: inactive awdl0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether be:c8:37:53:ae:24 inet6 fe80::bcc8:37ff:fe53:ae24%awdl0 prefixlen 64 scopeid 0x10 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether be:c8:37:53:ae:24 inet6 fe80::bcc8:37ff:fe53:ae24%llw0 prefixlen 64 scopeid 0x11 nd6 options=201<PERFORMNUD,DAD> media: autoselect (none) utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500 inet6 fe80::f92c:c871:5509:3882%utun0 prefixlen 64 scopeid 0x12 nd6 options=201<PERFORMNUD,DAD> utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::10a0:cf3e:5ac7:d00b%utun1 prefixlen 64 scopeid 0x13 nd6 options=201<PERFORMNUD,DAD> utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000 inet6 fe80::e570:11df:3beb:8b1e%utun2 prefixlen 64 scopeid 0x14 nd6 options=201<PERFORMNUD,DAD> utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1000 inet6 fe80::ce81:b1c:bd2c:69e%utun3 prefixlen 64 scopeid 0x15 nd6 options=201<PERFORMNUD,DAD> ipsec0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> inet6 fe80::8837:95aa:2539:811%ipsec0 prefixlen 64 scopeid 0x16 inet6 2607:fb90:fa78:8400:39bc:43b9:150:2e0d prefixlen 64 nd6 options=201<PERFORMNUD,DAD> utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::a413:c8c1:3fc5:9f31%utun4 prefixlen 64 scopeid 0x17 nd6 options=201<PERFORMNUD,DAD> utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::cd04:9da8:3f24:8331%utun5 prefixlen 64 scopeid 0x18 nd6 options=201<PERFORMNUD,DAD> utun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::692c:ec4b:d7ab:9195%utun6 prefixlen 64 scopeid 0x19 nd6 options=201<PERFORMNUD,DAD>
-
I'm new to VPNs and believed I had followed all the steps correctly, yet it still won't authenticate me. I've attempted Automatic protocols, OpenVPN UDP and TCP, as well as WireGuard. I've also tried disabling the Windows firewall. Nonetheless, I am unable to connect to any servers because of an authentication loop. The log file is attached; if anyone can diagnose the issue, please reply! Eddie_20240917_011939.txt
-
Hi ! I'm a new AirVPN's user and i got the disconnection loop. I connect to "a recommended server" and it connect me for like 5 second, disconnect, wait a bit and then reconnect me to another server. And then disconnect again. I was in touch with the support : I uninstalled AirVPN, Tap Windows after they told me to do so. They asked me to install "eddie-ui_2.16.2_windows-10_x64_installer", "openvpn-install-2.4.6-I602", both with administrator's right. I did it with my anti-virus (Avast) on off mode. Still, it didn't work at all. They even told me to ask for a refund if i wanted to. Does anyone have an idea ? I really would like to see AirVPN working, i know it is a good VPN. Thank you My logs for more information : . 2018.09.11 17:10:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.92.0/10.24.92.88/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:10:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.92.88/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.24.92.254, lease-time: 31536000]. 2018.09.11 17:10:00 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:10:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:10:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:145c::1056 store=active. 2018.09.11 17:10:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:145c::1 validate=no. 2018.09.11 17:10:02 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2018.09.11 17:10:03 - OpenVPN > add_route_ipv6(fde6:7a:7d20:145c::/64 -> fde6:7a:7d20:145c::1056 metric 0) dev Ethernet 2. 2018.09.11 17:10:03 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:145c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:10:03 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.92.1. 2018.09.11 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.92.1. 2018.09.11 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:07 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:145c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:10:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:07 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:145c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:07 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:145c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:07 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:145c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:10:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:10:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:10:07 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:10:07 - Disconnecting. 2018.09.11 17:10:07 - Sending management termination signal. 2018.09.11 17:10:07 - Management - Send 'signal SIGTERM'. 2018.09.11 17:10:07 - OpenVPN > MANAGEMENT: CMD 'e0a0e2288af40cebb38dc01443d3465adfc1b2909a4023f9db1e2f97e137dd95'. 2018.09.11 17:10:17 - Sending management termination signal. 2018.09.11 17:10:17 - Management - Send 'signal SIGTERM'. 2018.09.11 17:10:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:10:17 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:10:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.92.1. 2018.09.11 17:10:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.92.1. 2018.09.11 17:10:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:22 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:10:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:22 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:22 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:22 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:10:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:22 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:10:22 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:145c::/64). 2018.09.11 17:10:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:145c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:10:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:145c::1056 store=active. 2018.09.11 17:10:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:10:22 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:10:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:10:22 - Connection terminated.. 2018.09.11 17:10:22 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:10:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:10:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:10:25 - Checking authorization ...! 2018.09.11 17:10:26 - Connecting to Alrai (Netherlands, Alblasserdam). 2018.09.11 17:10:26 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:10:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:10:26 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:10:26 - Connection to OpenVPN Management Interface. 2018.09.11 17:10:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:10:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:10:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:10:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.78:443. 2018.09.11 17:10:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:10:26 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:10:26 - OpenVPN > UDP link remote: [AF_INET]213.152.162.78:443. 2018.09.11 17:10:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:10:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.78:443, sid=7e9b40aa c99bed26. 2018.09.11 17:10:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:10:26 - OpenVPN > VERIFY KU OK. 2018.09.11 17:10:26 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:10:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:10:26 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:10:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alrai, emailAddress=info@airvpn.org. 2018.09.11 17:10:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:10:26 - OpenVPN > [Alrai] Peer Connection Initiated with [AF_INET]213.152.162.78:443. 2018.09.11 17:10:27 - OpenVPN > SENT CONTROL [Alrai]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:10:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.156.1,dhcp-option DNS6 fde6:7a:7d20:39c::1,tun-ipv6,route-gateway 10.7.156.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:39c::102f/64 fde6:7a:7d20:39c::1,ifconfig 10.7.156.49 255.255.255.0,peer-id 6,cipher AES-256-GCM'. 2018.09.11 17:10:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:10:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:10:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:10:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:10:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:10:27 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:10:27 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:10:27 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:10:27 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:10:27 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:10:27 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:10:27 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:10:27 - OpenVPN > open_tun. 2018.09.11 17:10:27 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:10:27 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:10:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.156.0/10.7.156.49/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:10:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.156.49/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.7.156.254, lease-time: 31536000]. 2018.09.11 17:10:27 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:10:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:10:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:39c::102f store=active. 2018.09.11 17:10:29 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:39c::1 validate=no. 2018.09.11 17:10:30 - OpenVPN > add_route_ipv6(fde6:7a:7d20:39c::/64 -> fde6:7a:7d20:39c::102f metric 0) dev Ethernet 2. 2018.09.11 17:10:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:39c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:10:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.78 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:10:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:10:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.156.1. 2018.09.11 17:10:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:10:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.156.1. 2018.09.11 17:10:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:10:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:10:35 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:39c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:10:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:35 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:39c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:35 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:39c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:35 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:39c::1 metric -1) dev Ethernet 2. 2018.09.11 17:10:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:10:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:35 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:10:35 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:10:35 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:10:35 - Disconnecting. 2018.09.11 17:10:35 - Sending management termination signal. 2018.09.11 17:10:35 - Management - Send 'signal SIGTERM'. 2018.09.11 17:10:35 - OpenVPN > MANAGEMENT: CMD '3bebce115a306afe1ce4f26adb7b6b71576bb716ccc05fb26dbeb982bf2da001'. 2018.09.11 17:10:45 - Sending management termination signal. 2018.09.11 17:10:45 - Management - Send 'signal SIGTERM'. 2018.09.11 17:10:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:10:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.78 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:10:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.156.1. 2018.09.11 17:10:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.156.1. 2018.09.11 17:10:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:10:50 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:10:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:50 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:50 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:10:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:50 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:10:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:10:50 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:10:50 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:39c::/64). 2018.09.11 17:10:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:39c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:10:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:39c::102f store=active. 2018.09.11 17:10:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:10:51 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:10:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:10:51 - Connection terminated.. 2018.09.11 17:10:51 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:10:51 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:10:51 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:10:54 - Checking authorization .... 2018.09.11 17:10:55 - IPv6 disabled with packet filtering.! 2018.09.11 17:10:55 - Connecting to Alphard (Netherlands, Alblasserdam). 2018.09.11 17:10:55 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:10:55 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:10:55 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:10:55 - Connection to OpenVPN Management Interface. 2018.09.11 17:10:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:10:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:10:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:10:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.9:443. 2018.09.11 17:10:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:10:55 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:10:55 - OpenVPN > UDP link remote: [AF_INET]109.202.107.9:443. 2018.09.11 17:10:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=265f0c1e 468963f6. 2018.09.11 17:10:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:10:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:10:55 - OpenVPN > VERIFY KU OK. 2018.09.11 17:10:55 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:10:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:10:55 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:10:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:10:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:10:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443. 2018.09.11 17:10:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:10:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.71.109 255.255.0.0,peer-id 13,cipher AES-256-GCM'. 2018.09.11 17:10:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:10:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:10:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:10:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:10:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:10:56 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:10:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:10:56 - OpenVPN > open_tun. 2018.09.11 17:10:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:10:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:10:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.71.109/255.255.0.0 [sUCCEEDED]. 2018.09.11 17:10:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.71.109/255.255.0.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.09.11 17:10:57 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:10:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.09.11 17:11:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:11:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:11:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:11:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:11:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:11:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:01 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:11:01 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:11:01 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:11:01 - Disconnecting. 2018.09.11 17:11:01 - Sending management termination signal. 2018.09.11 17:11:01 - Management - Send 'signal SIGTERM'. 2018.09.11 17:11:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:11:01 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:11:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.9 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:11:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:11:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:11:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:06 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:11:06 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:11:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:11:06 - Connection terminated.. 2018.09.11 17:11:06 - IPv6 restored with packet filtering.. 2018.09.11 17:11:06 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:11:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:11:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:11:09 - Checking authorization ...! 2018.09.11 17:11:09 - Connecting to Kajam (Netherlands, Alblasserdam). 2018.09.11 17:11:09 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:11:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:11:09 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:11:09 - Connection to OpenVPN Management Interface. 2018.09.11 17:11:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:11:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:11:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:11:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.84:443. 2018.09.11 17:11:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:11:09 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:11:09 - OpenVPN > UDP link remote: [AF_INET]213.152.161.84:443. 2018.09.11 17:11:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:11:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=31e31a7b d301140f. 2018.09.11 17:11:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:11:10 - OpenVPN > VERIFY KU OK. 2018.09.11 17:11:10 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:11:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:11:10 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:11:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org. 2018.09.11 17:11:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:11:10 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.84:443. 2018.09.11 17:11:11 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:11:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.252.1,dhcp-option DNS6 fde6:7a:7d20:ffc::1,tun-ipv6,route-gateway 10.19.252.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ffc::10f7/64 fde6:7a:7d20:ffc::1,ifconfig 10.19.252.249 255.255.255.0,peer-id 10,cipher AES-256-GCM'. 2018.09.11 17:11:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:11:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:11:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:11:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:11:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:11:11 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:11:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:11:11 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:11:11 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:11:11 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:11:11 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:11:11 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:11:11 - OpenVPN > open_tun. 2018.09.11 17:11:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:11:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:11:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.252.0/10.19.252.249/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:11:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.252.249/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.19.252.254, lease-time: 31536000]. 2018.09.11 17:11:11 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:11:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:11:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:ffc::10f7 store=active. 2018.09.11 17:11:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:ffc::1 validate=no. 2018.09.11 17:11:14 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ffc::/64 -> fde6:7a:7d20:ffc::10f7 metric 0) dev Ethernet 2. 2018.09.11 17:11:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ffc::/64 interface=13 fe80::8 store=active. 2018.09.11 17:11:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:11:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:11:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.252.1. 2018.09.11 17:11:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.252.1. 2018.09.11 17:11:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:19 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ffc::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:11:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:19 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ffc::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:19 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ffc::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:19 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ffc::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:11:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:19 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:11:19 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:11:19 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:11:19 - Disconnecting. 2018.09.11 17:11:19 - Sending management termination signal. 2018.09.11 17:11:19 - Management - Send 'signal SIGTERM'. 2018.09.11 17:11:19 - OpenVPN > MANAGEMENT: CMD 'cd19de736dafc68204e22858bf4c18dcdba9d31d4c6481bf61d69fe1b9e8c1a5'. 2018.09.11 17:11:29 - Sending management termination signal. 2018.09.11 17:11:29 - Management - Send 'signal SIGTERM'. 2018.09.11 17:11:29 - OpenVpn Management > SUCCESS: password is correct. 2018.09.11 17:11:29 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:11:29 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:11:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.252.1. 2018.09.11 17:11:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.252.1. 2018.09.11 17:11:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:11:34 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:11:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:34 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:34 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:34 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:11:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:34 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:11:34 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ffc::/64). 2018.09.11 17:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ffc::/64 interface=13 fe80::8 store=active. 2018.09.11 17:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:ffc::10f7 store=active. 2018.09.11 17:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:11:34 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:11:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:11:34 - Connection terminated.. 2018.09.11 17:11:34 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:11:34 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:11:34 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:11:37 - Checking authorization ...! 2018.09.11 17:11:38 - Connecting to Muscida (Netherlands, Alblasserdam). 2018.09.11 17:11:38 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:11:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:11:38 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:11:38 - Connection to OpenVPN Management Interface. 2018.09.11 17:11:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:11:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:11:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:11:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.153:443. 2018.09.11 17:11:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:11:38 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:11:38 - OpenVPN > UDP link remote: [AF_INET]213.152.162.153:443. 2018.09.11 17:11:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.153:443, sid=3fbbd7bb 118756fc. 2018.09.11 17:11:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:11:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:11:38 - OpenVPN > VERIFY KU OK. 2018.09.11 17:11:38 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:11:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:11:38 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:11:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:11:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:11:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.153:443. 2018.09.11 17:11:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:11:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.156.1,dhcp-option DNS6 fde6:7a:7d20:149c::1,tun-ipv6,route-gateway 10.24.156.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:149c::1038/64 fde6:7a:7d20:149c::1,ifconfig 10.24.156.58 255.255.255.0,peer-id 1,cipher AES-256-GCM'. 2018.09.11 17:11:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:11:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:11:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:11:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:11:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:11:40 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:11:40 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:11:40 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:11:40 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:11:40 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:11:40 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:11:40 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:11:40 - OpenVPN > open_tun. 2018.09.11 17:11:40 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:11:40 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:11:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.156.0/10.24.156.58/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:11:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.156.58/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.24.156.254, lease-time: 31536000]. 2018.09.11 17:11:40 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:11:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:11:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:149c::1038 store=active. 2018.09.11 17:11:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:149c::1 validate=no. 2018.09.11 17:11:42 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2018.09.11 17:11:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:149c::/64 -> fde6:7a:7d20:149c::1038 metric 0) dev Ethernet 2. 2018.09.11 17:11:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:149c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:11:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.153 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:11:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:11:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.156.1. 2018.09.11 17:11:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.156.1. 2018.09.11 17:11:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:11:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:11:47 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:149c::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:11:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:47 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:149c::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:47 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:149c::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:11:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:47 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:149c::1 metric -1) dev Ethernet 2. 2018.09.11 17:11:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:11:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:11:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:11:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:11:47 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:11:47 - Disconnecting. 2018.09.11 17:11:47 - Sending management termination signal. 2018.09.11 17:11:47 - Management - Send 'signal SIGTERM'. 2018.09.11 17:11:47 - OpenVPN > MANAGEMENT: CMD '3a8bc07e8c0bd81a4650f05e4c69b1eec7624d4d9bd905494b6ee36e11ffb6a6'. 2018.09.11 17:11:57 - Sending management termination signal. 2018.09.11 17:11:57 - Management - Send 'signal SIGTERM'. 2018.09.11 17:11:57 - OpenVpn Management > SUCCESS: password is correct. 2018.09.11 17:11:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:11:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.153 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:12:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.156.1. 2018.09.11 17:12:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.156.1. 2018.09.11 17:12:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:02 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:12:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:02 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:02 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:02 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:12:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:02 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:12:02 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:149c::/64). 2018.09.11 17:12:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:149c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:149c::1038 store=active. 2018.09.11 17:12:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:12:03 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:12:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:12:03 - Connection terminated.. 2018.09.11 17:12:03 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:12:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:12:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:12:06 - Checking authorization ...! 2018.09.11 17:12:06 - Connecting to Alcyone (Netherlands, Alblasserdam). 2018.09.11 17:12:06 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:12:06 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:12:06 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:12:06 - Connection to OpenVPN Management Interface. 2018.09.11 17:12:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.116:443. 2018.09.11 17:12:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:12:06 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:12:06 - OpenVPN > UDP link remote: [AF_INET]213.152.161.116:443. 2018.09.11 17:12:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.116:443, sid=1d9e6470 4b936916. 2018.09.11 17:12:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:12:07 - OpenVPN > VERIFY KU OK. 2018.09.11 17:12:07 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:12:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:12:07 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:12:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:12:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:12:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.116:443. 2018.09.11 17:12:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:12:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.220.1,dhcp-option DNS6 fde6:7a:7d20:1dc::1,tun-ipv6,route-gateway 10.5.220.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1dc::1045/64 fde6:7a:7d20:1dc::1,ifconfig 10.5.220.71 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.09.11 17:12:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:12:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:12:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:12:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:08 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:12:08 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:12:08 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:12:08 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:12:08 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:12:08 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:12:08 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:12:08 - OpenVPN > open_tun. 2018.09.11 17:12:08 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:12:08 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:12:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.220.0/10.5.220.71/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:12:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.220.71/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.5.220.254, lease-time: 31536000]. 2018.09.11 17:12:08 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:12:08 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:12:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:1dc::1045 store=active. 2018.09.11 17:12:10 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1dc::1 validate=no. 2018.09.11 17:12:10 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1dc::/64 -> fde6:7a:7d20:1dc::1045 metric 0) dev Ethernet 2. 2018.09.11 17:12:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1dc::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:10 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.116 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:12:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:12:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.220.1. 2018.09.11 17:12:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:12:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.220.1. 2018.09.11 17:12:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:12:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:15 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1dc::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:12:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:15 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1dc::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:15 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1dc::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:15 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1dc::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:12:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:15 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:12:15 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:12:15 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:12:15 - Disconnecting. 2018.09.11 17:12:15 - Sending management termination signal. 2018.09.11 17:12:15 - Management - Send 'signal SIGTERM'. 2018.09.11 17:12:15 - OpenVPN > MANAGEMENT: CMD 'b8d13e75e6dafcc7cd3cd2240dcdf84f7daaeee608172a96cde3d1ce28a8a760'. 2018.09.11 17:12:24 - Sending management termination signal. 2018.09.11 17:12:24 - Management - Send 'signal SIGTERM'. 2018.09.11 17:12:24 - OpenVpn Management > SUCCESS: password is correct. 2018.09.11 17:12:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:12:24 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.116 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:12:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.220.1. 2018.09.11 17:12:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.220.1. 2018.09.11 17:12:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:29 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:12:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:29 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:29 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:29 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:12:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:12:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:30 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:12:30 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1dc::/64). 2018.09.11 17:12:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1dc::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1dc::1045 store=active. 2018.09.11 17:12:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:12:30 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:12:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:12:30 - Connection terminated.. 2018.09.11 17:12:30 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:12:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:12:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:12:33 - Checking authorization ...! 2018.09.11 17:12:33 - Connecting to Atria (Sweden, Uppsala). 2018.09.11 17:12:33 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:12:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:12:33 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:12:33 - Connection to OpenVPN Management Interface. 2018.09.11 17:12:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.150:443. 2018.09.11 17:12:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:12:33 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:12:33 - OpenVPN > UDP link remote: [AF_INET]62.102.148.150:443. 2018.09.11 17:12:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:33 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=b86315c7 a4a6adad. 2018.09.11 17:12:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:12:33 - OpenVPN > VERIFY KU OK. 2018.09.11 17:12:33 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:12:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:12:33 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:12:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Atria, emailAddress=info@airvpn.org. 2018.09.11 17:12:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:12:34 - OpenVPN > [Atria] Peer Connection Initiated with [AF_INET]62.102.148.150:443. 2018.09.11 17:12:35 - OpenVPN > SENT CONTROL [Atria]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:12:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.140.1,dhcp-option DNS6 fde6:7a:7d20:68c::1,tun-ipv6,route-gateway 10.10.140.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:68c::1048/64 fde6:7a:7d20:68c::1,ifconfig 10.10.140.74 255.255.255.0,peer-id 16,cipher AES-256-GCM'. 2018.09.11 17:12:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:12:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:12:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:12:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:35 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:12:35 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:12:35 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:12:35 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:12:35 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:12:35 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:12:35 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:12:35 - OpenVPN > open_tun. 2018.09.11 17:12:35 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:12:35 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:12:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.10.140.0/10.10.140.74/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:12:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.140.74/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.10.140.254, lease-time: 31536000]. 2018.09.11 17:12:35 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:12:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:12:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:68c::1048 store=active. 2018.09.11 17:12:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:68c::1 validate=no. 2018.09.11 17:12:37 - OpenVPN > add_route_ipv6(fde6:7a:7d20:68c::/64 -> fde6:7a:7d20:68c::1048 metric 0) dev Ethernet 2. 2018.09.11 17:12:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:68c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.10.140.1. 2018.09.11 17:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.10.140.1. 2018.09.11 17:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:12:42 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:68c::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:12:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:42 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:68c::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:42 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:68c::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:42 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:68c::1 metric -1) dev Ethernet 2. 2018.09.11 17:12:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:12:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:42 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:12:42 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:12:42 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:12:42 - Disconnecting. 2018.09.11 17:12:42 - Sending management termination signal. 2018.09.11 17:12:42 - Management - Send 'signal SIGTERM'. 2018.09.11 17:12:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:12:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:12:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.10.140.1. 2018.09.11 17:12:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.10.140.1. 2018.09.11 17:12:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:12:47 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:12:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:47 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:47 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:12:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:47 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:12:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:12:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:12:48 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:12:48 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:68c::/64). 2018.09.11 17:12:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:68c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:68c::1048 store=active. 2018.09.11 17:12:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:12:48 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:12:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:12:48 - Connection terminated.. 2018.09.11 17:12:48 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:12:48 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:12:48 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:12:51 - Checking authorization ...! 2018.09.11 17:12:51 - Connecting to Kocab (Netherlands, Alblasserdam). 2018.09.11 17:12:51 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:12:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:12:51 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:12:51 - Connection to OpenVPN Management Interface. 2018.09.11 17:12:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:12:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.180:443. 2018.09.11 17:12:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:12:51 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:12:51 - OpenVPN > UDP link remote: [AF_INET]213.152.162.180:443. 2018.09.11 17:12:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.180:443, sid=0934a0b2 b9708885. 2018.09.11 17:12:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:12:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:12:51 - OpenVPN > VERIFY KU OK. 2018.09.11 17:12:51 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:12:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:12:51 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:12:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:12:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:12:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.180:443. 2018.09.11 17:12:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:12:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.124.1,dhcp-option DNS6 fde6:7a:7d20:107c::1,tun-ipv6,route-gateway 10.20.124.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:107c::10c2/64 fde6:7a:7d20:107c::1,ifconfig 10.20.124.196 255.255.255.0,peer-id 1,cipher AES-256-GCM'. 2018.09.11 17:12:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:12:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:12:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:12:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:12:53 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:12:53 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:12:53 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.11 17:12:53 - OpenVPN > GetBestInterfaceEx() returned if=14. 2018.09.11 17:12:53 - OpenVPN > GDG6: II=14 DP=::/0 NH=fe80::224:d4ff:fea3:2d06. 2018.09.11 17:12:53 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.09.11 17:12:53 - OpenVPN > ROUTE6_GATEWAY fe80::224:d4ff:fea3:2d06 I=14. 2018.09.11 17:12:53 - OpenVPN > open_tun. 2018.09.11 17:12:53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:12:53 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:12:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.124.0/10.20.124.196/255.255.255.0 [sUCCEEDED]. 2018.09.11 17:12:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.124.196/255.255.255.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.20.124.254, lease-time: 31536000]. 2018.09.11 17:12:53 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:12:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.09.11 17:12:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:107c::10c2 store=active. 2018.09.11 17:12:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:107c::1 validate=no. 2018.09.11 17:12:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:107c::/64 -> fde6:7a:7d20:107c::10c2 metric 0) dev Ethernet 2. 2018.09.11 17:12:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:107c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:12:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.180 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:13:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:13:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.124.1. 2018.09.11 17:13:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:13:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.124.1. 2018.09.11 17:13:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:13:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:00 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:107c::1 metric -1) dev Ethernet 2. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:13:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:107c::1 metric -1) dev Ethernet 2. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:13:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:107c::1 metric -1) dev Ethernet 2. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:13:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:107c::1 metric -1) dev Ethernet 2. 2018.09.11 17:13:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:13:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:00 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:13:00 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:13:00 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:13:00 - Disconnecting. 2018.09.11 17:13:00 - Sending management termination signal. 2018.09.11 17:13:00 - Management - Send 'signal SIGTERM'. 2018.09.11 17:13:00 - OpenVPN > MANAGEMENT: CMD 'c9ed70e4ccb62afc56aed0285362c159c88c19bdf8aca50fff4074e13ff8988d'. 2018.09.11 17:13:10 - Sending management termination signal. 2018.09.11 17:13:10 - Management - Send 'signal SIGTERM'. 2018.09.11 17:13:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:13:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:13:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.124.1. 2018.09.11 17:13:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.124.1. 2018.09.11 17:13:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:15 - OpenVPN > delete_route_ipv6(::/3). 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active. 2018.09.11 17:13:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:15 - OpenVPN > delete_route_ipv6(2000::/4). 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:13:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:15 - OpenVPN > delete_route_ipv6(3000::/4). 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active. 2018.09.11 17:13:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:15 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active. 2018.09.11 17:13:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.09.11 17:13:15 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:13:15 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:107c::/64). 2018.09.11 17:13:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:107c::/64 interface=13 fe80::8 store=active. 2018.09.11 17:13:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:107c::10c2 store=active. 2018.09.11 17:13:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.09.11 17:13:15 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:13:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:13:15 - Connection terminated.. 2018.09.11 17:13:15 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:13:15 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:13:15 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:13:18 - Checking authorization .... 2018.09.11 17:13:19 - IPv6 disabled with packet filtering.! 2018.09.11 17:13:19 - Connecting to Alterf (Netherlands, Alblasserdam). 2018.09.11 17:13:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:13:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:13:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:13:19 - Connection to OpenVPN Management Interface. 2018.09.11 17:13:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:13:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:13:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:13:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.169:443. 2018.09.11 17:13:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:13:19 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:13:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.169:443. 2018.09.11 17:13:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:13:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=3a62092d 0a3ca7c0. 2018.09.11 17:13:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:13:19 - OpenVPN > VERIFY KU OK. 2018.09.11 17:13:19 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:13:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:13:19 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:13:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:13:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:13:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443. 2018.09.11 17:13:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:13:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.63.183 255.255.0.0,peer-id 43,cipher AES-256-GCM'. 2018.09.11 17:13:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:13:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:13:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:13:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:13:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:13:25 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:13:25 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:13:25 - OpenVPN > open_tun. 2018.09.11 17:13:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:13:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:13:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.63.183/255.255.0.0 [sUCCEEDED]. 2018.09.11 17:13:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.63.183/255.255.0.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.09.11 17:13:25 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:13:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.09.11 17:13:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.09.11 17:13:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.169 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:13:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.09.11 17:13:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:13:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:13:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:13:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.09.11 17:13:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.09.11 17:13:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.09.11 17:13:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6W 2018.09.11 17:13:30 - Windows WFP, Add rule failed: App not found:<rule name="Dns - Allow port 53 of OpenVPN" layer="ale_auth_connect_v4" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ale_app_id" match="equal" path="E:\Perso\Intérêt\Logiciels Utiles\AirVPN\AirVPN\openvpn.exe" /></rule>! 2018.09.11 17:13:30 - Disconnecting. 2018.09.11 17:13:30 - Sending management termination signal. 2018.09.11 17:13:30 - Management - Send 'signal SIGTERM'. 2018.09.11 17:13:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:13:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:13:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.169 MASK 255.255.255.255 192.168.0.254. 2018.09.11 17:13:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:13:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.09.11 17:13:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.09.11 17:13:36 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:13:36 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:13:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:13:36 - Connection terminated.. 2018.09.11 17:13:36 - IPv6 restored with packet filtering.. 2018.09.11 17:13:36 - DNS leak protection with packet filtering disabled.. 2018.09.11 17:13:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.09.11 17:13:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.09.11 17:13:39 - Checking authorization .... 2018.09.11 17:13:39 - IPv6 disabled with packet filtering.! 2018.09.11 17:13:39 - Connecting to Muphrid (Sweden, Uppsala). 2018.09.11 17:13:39 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.11 17:13:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.11 17:13:39 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.11 17:13:39 - Connection to OpenVPN Management Interface. 2018.09.11 17:13:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.11 17:13:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:13:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.11 17:13:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.146:443. 2018.09.11 17:13:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.11 17:13:39 - OpenVPN > UDP link local: (not bound). 2018.09.11 17:13:39 - OpenVPN > UDP link remote: [AF_INET]62.102.148.146:443. 2018.09.11 17:13:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.11 17:13:39 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=ad6be551 c855c40b. 2018.09.11 17:13:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.11 17:13:39 - OpenVPN > VERIFY KU OK. 2018.09.11 17:13:39 - OpenVPN > Validating certificate extended key usage. 2018.09.11 17:13:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.11 17:13:39 - OpenVPN > VERIFY EKU OK. 2018.09.11 17:13:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.11 17:13:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.11 17:13:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443. 2018.09.11 17:13:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)! 2018.09.11 17:13:43 - Disconnecting. 2018.09.11 17:13:43 - Sending management termination signal. 2018.09.11 17:13:43 - Management - Send 'signal SIGTERM'. 2018.09.11 17:13:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.11 17:13:43 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.11 17:13:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.11 17:13:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.45.144 255.255.0.0,peer-id 112,cipher AES-256-GCM'. 2018.09.11 17:13:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.11 17:13:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.11 17:13:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.11 17:13:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:13:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.11 17:13:47 - OpenVPN > interactive service msg_channel=0. 2018.09.11 17:13:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=14 HWADDR=08:62:66:48:cc:f0. 2018.09.11 17:13:48 - OpenVPN > open_tun. 2018.09.11 17:13:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A92A6589-385C-4D94-A84B-497E7C2D5B5C}.tap. 2018.09.11 17:13:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.09.11 17:13:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.45.144/255.255.0.0 [sUCCEEDED]. 2018.09.11 17:13:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.144/255.255.0.0 on interface {A92A6589-385C-4D94-A84B-497E7C2D5B5C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.09.11 17:13:48 - OpenVPN > Successful ARP Flush on interface [13] {A92A6589-385C-4D94-A84B-497E7C2D5B5C}. 2018.09.11 17:13:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.09.11 17:13:48 - OpenVPN > Closing TUN/TAP interface. 2018.09.11 17:13:48 - OpenVPN > TAP: DHCP address released. 2018.09.11 17:13:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.09.11 17:13:48 - Connection terminated.. 2018.09.11 17:13:48 - IPv6 restored with packet filtering.I 2018.09.11 17:13:48 - Cancel requested.! 2018.09.11 17:13:48 - Session terminated.
-
Hey there, using latest version of eddie on Mac OS Yosemite 10.10.5 ! Eddie worked fine a few months ago, but needed to uninstall. Problem only occurs now for first time after some months not using. PROBLEM: Connect - Disconnect - Connect - Disconnect - Loop... Thanks for your help! Here's the LOG: . 2018.06.23 18:25:04 - Eddie version: 2.15.2 / macos_x64, System: MacOS, Name: 10.10.5, Version: Darwin Serandomirs-MacBook-Pro.local 14.5.0 Darwin Kernel Version 14.5.0: Sun Jun 4 21:40:08 PDT 2017; root:xnu-2782.70.3~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319 . 2018.06.23 18:25:04 - Reading options from /Users/serandomir/.airvpn/default.xml . 2018.06.23 18:25:06 - Command line arguments (0): . 2018.06.23 18:25:06 - Profile path: /Users/serandomir/.airvpn/default.xml . 2018.06.23 18:25:09 - OpenVPN Driver - Expected . 2018.06.23 18:25:09 - OpenVPN - Version: - (/Applications/Eddie.app/Contents/MacOS/openvpn) . 2018.06.23 18:25:09 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh) . 2018.06.23 18:25:09 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel) . 2018.06.23 18:25:09 - curl - Version: 7.43.0 (/usr/bin/curl) . 2018.06.23 18:25:09 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem . 2018.06.23 18:25:10 - Updating systems & servers data ... I 2018.06.23 18:25:10 - Ready . 2018.06.23 18:25:11 - Systems & servers data update completed ! 2018.06.23 18:25:16 - Activation of Network Lock - macOS - PF . 2018.06.23 18:25:16 - macOS - PF rules updated, reloading I 2018.06.23 18:25:22 - Session starting. I 2018.06.23 18:25:23 - Checking authorization ... ! 2018.06.23 18:25:24 - Connecting to Errai (Germany, Frankfurt) . 2018.06.23 18:25:24 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:24 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:24 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:24 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:24 - Above log line repeated 1 times more ! 2018.06.23 18:25:24 - Disconnecting . 2018.06.23 18:25:24 - Connection terminated. I 2018.06.23 18:25:27 - Checking authorization ... . 2018.06.23 18:25:28 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:25:28 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:25:28 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:25:28 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:25:28 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:25:29 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:25:29 - Connecting to Libertas (Germany, Munich) . 2018.06.23 18:25:29 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:29 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:29 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:29 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:29 - Above log line repeated 1 times more ! 2018.06.23 18:25:29 - Disconnecting . 2018.06.23 18:25:29 - Connection terminated. . 2018.06.23 18:25:29 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:25:29 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:25:29 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:25:29 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:25:29 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:25:29 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:25:32 - Checking authorization ... ! 2018.06.23 18:25:33 - Connecting to Mesarthim (Germany, Munich) . 2018.06.23 18:25:33 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:33 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:33 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:33 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:33 - Above log line repeated 1 times more ! 2018.06.23 18:25:33 - Disconnecting . 2018.06.23 18:25:33 - Connection terminated. I 2018.06.23 18:25:36 - Checking authorization ... ! 2018.06.23 18:25:37 - Connecting to Perseus (Germany, Munich) . 2018.06.23 18:25:37 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:37 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:38 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:38 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:38 - Above log line repeated 1 times more ! 2018.06.23 18:25:38 - Disconnecting . 2018.06.23 18:25:38 - Connection terminated. I 2018.06.23 18:25:41 - Checking authorization ... ! 2018.06.23 18:25:41 - Connecting to Lepus (Germany, Munich) . 2018.06.23 18:25:42 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:42 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:42 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:42 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:42 - Above log line repeated 1 times more ! 2018.06.23 18:25:42 - Disconnecting . 2018.06.23 18:25:42 - Connection terminated. I 2018.06.23 18:25:45 - Checking authorization ... ! 2018.06.23 18:25:46 - Connecting to Adhara (Germany, Frankfurt) . 2018.06.23 18:25:46 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:25:46 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:25:46 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:25:46 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:25:46 - Above log line repeated 1 times more ! 2018.06.23 18:25:46 - Disconnecting . 2018.06.23 18:25:46 - Connection terminated. I 2018.06.23 18:25:47 - Cancel requested. ! 2018.06.23 18:25:47 - Session terminated. ! 2018.06.23 18:26:06 - Deactivation of Network Lock I 2018.06.23 18:36:49 - Session starting. I 2018.06.23 18:36:49 - Retrieving manifest . 2018.06.23 18:36:49 - Updating systems & servers data ... I 2018.06.23 18:36:49 - Checking authorization ... ! 2018.06.23 18:36:50 - Connecting to Cervantes (Germany, Frankfurt) . 2018.06.23 18:36:51 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:36:51 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:36:51 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:36:51 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:36:51 - Above log line repeated 1 times more ! 2018.06.23 18:36:51 - Disconnecting . 2018.06.23 18:36:51 - Connection terminated. . 2018.06.23 18:36:51 - Systems & servers data update completed I 2018.06.23 18:36:54 - Checking authorization ... ! 2018.06.23 18:36:55 - Connecting to Ogma (Germany, Frankfurt) . 2018.06.23 18:36:55 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:36:55 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:36:55 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:36:55 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:36:55 - Above log line repeated 1 times more ! 2018.06.23 18:36:55 - Disconnecting . 2018.06.23 18:36:55 - Connection terminated. I 2018.06.23 18:36:58 - Checking authorization ... ! 2018.06.23 18:36:59 - Connecting to Perseus (Germany, Munich) . 2018.06.23 18:36:59 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:36:59 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:36:59 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:36:59 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:36:59 - Above log line repeated 1 times more ! 2018.06.23 18:36:59 - Disconnecting . 2018.06.23 18:36:59 - Connection terminated. I 2018.06.23 18:37:02 - Checking authorization ... . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:03 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:03 - Connecting to Libertas (Germany, Munich) . 2018.06.23 18:37:04 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:04 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:04 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:04 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:04 - Above log line repeated 1 times more ! 2018.06.23 18:37:04 - Disconnecting . 2018.06.23 18:37:04 - Connection terminated. . 2018.06.23 18:37:04 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:04 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:04 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:04 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:04 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:04 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:07 - Checking authorization ... ! 2018.06.23 18:37:08 - Connecting to Mesarthim (Germany, Munich) . 2018.06.23 18:37:08 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:08 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:08 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:08 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:08 - Above log line repeated 1 times more ! 2018.06.23 18:37:08 - Disconnecting . 2018.06.23 18:37:08 - Connection terminated. I 2018.06.23 18:37:11 - Checking authorization ... ! 2018.06.23 18:37:12 - Connecting to Lepus (Germany, Munich) . 2018.06.23 18:37:12 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:12 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:12 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:12 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:12 - Above log line repeated 1 times more ! 2018.06.23 18:37:12 - Disconnecting . 2018.06.23 18:37:12 - Connection terminated. I 2018.06.23 18:37:15 - Checking authorization ... ! 2018.06.23 18:37:16 - Connecting to Adhara (Germany, Frankfurt) . 2018.06.23 18:37:16 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:16 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:16 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:16 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:16 - Above log line repeated 1 times more ! 2018.06.23 18:37:16 - Disconnecting . 2018.06.23 18:37:16 - Connection terminated. I 2018.06.23 18:37:19 - Checking authorization ... ! 2018.06.23 18:37:20 - Connecting to Errai (Germany, Frankfurt) . 2018.06.23 18:37:20 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:20 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:20 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:20 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:20 - Above log line repeated 1 times more ! 2018.06.23 18:37:20 - Disconnecting . 2018.06.23 18:37:20 - Connection terminated. I 2018.06.23 18:37:23 - Checking authorization ... ! 2018.06.23 18:37:24 - Connecting to Cervantes (Germany, Frankfurt) . 2018.06.23 18:37:24 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:24 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:24 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:24 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:24 - Above log line repeated 1 times more ! 2018.06.23 18:37:24 - Disconnecting . 2018.06.23 18:37:24 - Connection terminated. I 2018.06.23 18:37:27 - Checking authorization ... . 2018.06.23 18:37:28 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:29 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:29 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:29 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:29 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:29 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:29 - Connecting to Kleeia (Canada, Vancouver) . 2018.06.23 18:37:29 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:29 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:29 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:29 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:29 - Above log line repeated 1 times more ! 2018.06.23 18:37:29 - Disconnecting . 2018.06.23 18:37:29 - Connection terminated. . 2018.06.23 18:37:29 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:29 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:30 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:30 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:30 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:30 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:33 - Checking authorization ... . 2018.06.23 18:37:34 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:34 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:34 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:34 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:34 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:35 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:35 - Connecting to Gemma (Canada, Vancouver) . 2018.06.23 18:37:35 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:35 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:35 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:35 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:35 - Above log line repeated 1 times more ! 2018.06.23 18:37:35 - Disconnecting . 2018.06.23 18:37:35 - Connection terminated. . 2018.06.23 18:37:35 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:35 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:35 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:35 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:35 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:35 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:38 - Checking authorization ... . 2018.06.23 18:37:39 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:39 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:39 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:40 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:40 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:40 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:40 - Connecting to Homam (Canada, Vancouver) . 2018.06.23 18:37:40 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:40 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:40 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:40 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:40 - Above log line repeated 1 times more ! 2018.06.23 18:37:40 - Disconnecting . 2018.06.23 18:37:40 - Connection terminated. . 2018.06.23 18:37:40 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:40 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:41 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:41 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:41 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:41 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:44 - Checking authorization ... . 2018.06.23 18:37:45 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:45 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:45 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:45 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:45 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:46 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:46 - Connecting to Mimosa (Canada, Vancouver) . 2018.06.23 18:37:46 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:46 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:46 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:46 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:47 - Above log line repeated 1 times more ! 2018.06.23 18:37:47 - Disconnecting . 2018.06.23 18:37:47 - Connection terminated. . 2018.06.23 18:37:47 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:47 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:47 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:47 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:47 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:47 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:50 - Checking authorization ... . 2018.06.23 18:37:51 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:51 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:52 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:52 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:52 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:52 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:52 - Connecting to Cynosura (Canada, Vancouver) . 2018.06.23 18:37:52 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:52 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:52 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:52 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:53 - Above log line repeated 1 times more ! 2018.06.23 18:37:53 - Disconnecting . 2018.06.23 18:37:53 - Connection terminated. . 2018.06.23 18:37:53 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:53 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:53 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:53 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:53 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:53 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:37:56 - Checking authorization ... . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:37:58 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:37:58 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2018.06.23 18:37:58 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:37:58 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:37:59 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:37:59 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:37:59 - Above log line repeated 1 times more ! 2018.06.23 18:37:59 - Disconnecting . 2018.06.23 18:37:59 - Connection terminated. . 2018.06.23 18:37:59 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:37:59 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:37:59 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:37:59 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:37:59 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:37:59 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:38:02 - Checking authorization ... ! 2018.06.23 18:38:03 - Connecting to Cephei (Canada, Toronto, Ontario) . 2018.06.23 18:38:03 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:38:03 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:38:04 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:38:04 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:38:04 - Above log line repeated 1 times more ! 2018.06.23 18:38:04 - Disconnecting . 2018.06.23 18:38:04 - Connection terminated. I 2018.06.23 18:38:07 - Checking authorization ... . 2018.06.23 18:38:08 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:38:09 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:38:09 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:38:09 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:38:09 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:38:09 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:38:09 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2018.06.23 18:38:09 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:38:09 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:38:09 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:38:09 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:38:09 - Above log line repeated 1 times more ! 2018.06.23 18:38:09 - Disconnecting . 2018.06.23 18:38:09 - Connection terminated. . 2018.06.23 18:38:10 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:38:10 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:38:10 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:38:10 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:38:10 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:38:10 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:38:11 - Cancel requested. ! 2018.06.23 18:38:11 - Session terminated. I 2018.06.23 18:45:34 - Session starting. I 2018.06.23 18:45:34 - Checking authorization ... . 2018.06.23 18:45:35 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:45:35 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:45:35 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:45:35 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:45:35 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:45:36 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:45:36 - Connecting to Tyl (Canada, Toronto, Ontario) . 2018.06.23 18:45:36 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:45:36 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:45:36 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:45:36 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:45:36 - Above log line repeated 1 times more ! 2018.06.23 18:45:36 - Disconnecting . 2018.06.23 18:45:36 - Connection terminated. . 2018.06.23 18:45:36 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:45:37 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:45:37 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:45:37 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:45:37 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:45:37 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:45:40 - Checking authorization ... . 2018.06.23 18:45:41 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:45:41 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:45:41 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:45:42 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:45:42 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:45:42 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:45:42 - Connecting to Sargas (Canada, Toronto, Ontario) . 2018.06.23 18:45:42 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:45:42 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:45:42 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:45:42 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:45:42 - Above log line repeated 1 times more ! 2018.06.23 18:45:42 - Disconnecting . 2018.06.23 18:45:42 - Connection terminated. . 2018.06.23 18:45:42 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:45:42 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:45:43 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:45:43 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:45:43 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:45:43 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:45:44 - Cancel requested. ! 2018.06.23 18:45:44 - Session terminated. . 2018.06.23 18:47:37 - Updating systems & servers data ... . 2018.06.23 18:47:39 - Systems & servers data update completed I 2018.06.23 18:47:44 - Session starting. I 2018.06.23 18:47:44 - Checking authorization ... ! 2018.06.23 18:47:45 - Connecting to Aludra (Canada, Toronto, Ontario) . 2018.06.23 18:47:45 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:47:45 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:47:45 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:47:45 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:47:46 - Above log line repeated 1 times more ! 2018.06.23 18:47:46 - Disconnecting . 2018.06.23 18:47:46 - Connection terminated. I 2018.06.23 18:47:49 - Checking authorization ... . 2018.06.23 18:47:50 - IPv6 disabled on network adapter (Bluetooth DUN) . 2018.06.23 18:47:50 - IPv6 disabled on network adapter (Ethernet) . 2018.06.23 18:47:50 - IPv6 disabled on network adapter (FireWire) . 2018.06.23 18:47:50 - IPv6 disabled on network adapter (Wi-Fi) . 2018.06.23 18:47:51 - IPv6 disabled on network adapter (Bluetooth PAN) . 2018.06.23 18:47:51 - IPv6 disabled on network adapter (Thunderbolt Bridge) ! 2018.06.23 18:47:51 - Connecting to Saiph (Canada, Toronto, Ontario) . 2018.06.23 18:47:51 - OpenVPN > dyld: Library not loaded: @loader_path/liblzo2.2.dylib . 2018.06.23 18:47:51 - OpenVPN > Referenced from: /Applications/Eddie.app/Contents/MacOS/openvpn . 2018.06.23 18:47:51 - OpenVPN > Reason: no suitable image found. Did find: . 2018.06.23 18:47:51 - OpenVPN > /Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib: code signature invalid for '/Applications/Eddie.app/Contents/MacOS/liblzo2.2.dylib' . 2018.06.23 18:47:51 - Above log line repeated 1 times more ! 2018.06.23 18:47:51 - Disconnecting . 2018.06.23 18:47:51 - Connection terminated. . 2018.06.23 18:47:51 - IPv6 restored on network adapter (Bluetooth DUN) . 2018.06.23 18:47:51 - IPv6 restored on network adapter (Ethernet) . 2018.06.23 18:47:51 - IPv6 restored on network adapter (FireWire) . 2018.06.23 18:47:51 - IPv6 restored on network adapter (Wi-Fi) . 2018.06.23 18:47:51 - IPv6 restored on network adapter (Bluetooth PAN) . 2018.06.23 18:47:51 - IPv6 restored on network adapter (Thunderbolt Bridge) I 2018.06.23 18:47:53 - Cancel requested. ! 2018.06.23 18:47:53 - Session terminated.
-
Solved: "Recursive routing detected" loop issue using OpenVPN on DD-WRT
Guest posted a topic in Troubleshooting and Problems
Hello forum! I've used OpenVPN on Asus RT-N18U running DD-WRT over a year now. I made files up.sh to start and dn.sh to stop OpenVPN to get rid of GUI and later on to run them via ssh from lan. OpenVPN version got updated to 2.4 and I made the necessary changes to conf file and scripts. It ran without issues couple of months. However, last Thursday my VPN connection went down while I was just browsing the interwebs. OpenVPN log was filled with messages: Recursive routing detected, drop tun packet to [AF_INET]62.102.148.132:443. There's no difference if I set up OpenVPN via GUI or use only my scripts. I've tried both UDP and TCP protocols but the issue persists. Outcome is always the same. Since then I've contacted AirVPN support as I cannot fix this by myself. I don't have the skills for that and I've tried my everything. As you may notice I feel desperate. EDIT: Here was a zip-file including kernel and ip routing tables, scripts, openvpn.conf file and OpenVPN log. I've censored my IP-address and tun1 IP from the files. All I found out is that the router for some reason removes line 62.102.148.132 via 84.xx.xx.xx dev vlan2 from routing table. You can see the difference between before-error_ip-route.txt. and after-error_ip-route.txt. DD-WRT seems to think that the fastest route outside is only via tun1 as VPN endpoint IP is in the same location as tun1 IP-address. Just a guess, might be totally wrong. Then it removes the previously mentioned routing rule and creates a loop. If I use allow-recursive-routing option in OpenVPN configuration, after a while log begins to spam "UDP messages too big" or something like that. I hadn't done any changes to DD-WRT settings, configuration files or script files. Recursive routing just popped up from no where. Router is being used as a gateway and WiFi AP only. All I've done is I moved to a new apartment which has different IP-address provided by the same ISP. That might not affect anything, just FYI. I really hope someone could help me with this. Thanks. Update: Turns out my ISP assings new IP-address every 20 minutes and almost every service on DD-WRT restarts which makes everything kind of frustrating to config... -
Hi I just bought the service and whenever I try to connect, either though the automatic system or through the server menu screen I get a loop of "connecting to x" followed by restart in 3...2...1.. and then the same "connecting to x" message as before. It never connects to the server nor does it. Any tips?
-
I have Windows 7 64 Bit and the reconnect Loop Problem.I cannot connect to any server outside of NL and in the Log there is always a "AIR VPN Windows Interface Hack" I 2016.06.16 20:19:56 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7600.0 / x64 . 2016.06.16 20:19:56 - Reading options from C:\Users\Typ\AppData\Local\AirVPN\AirVPN.xml . 2016.06.16 20:20:00 - Data Path: C:\Users\Typ\AppData\Local\AirVPN . 2016.06.16 20:20:00 - App Path: C:\Program Files\AirVPN . 2016.06.16 20:20:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.06.16 20:20:00 - Command line arguments (1): path="home" . 2016.06.16 20:20:00 - Operating System: Microsoft Windows NT 6.1.7600.0 . 2016.06.16 20:20:00 - Updating systems & servers data ... I 2016.06.16 20:20:05 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.06.16 20:20:05 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.06.16 20:20:05 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.06.16 20:20:05 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.06.16 20:20:05 - Ready . 2016.06.16 20:20:06 - Systems & servers data update completed I 2016.06.16 20:20:07 - Session starting. I 2016.06.16 20:20:07 - IPv6 disabled. I 2016.06.16 20:20:08 - Checking authorization ... ! 2016.06.16 20:20:08 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.06.16 20:20:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:20:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:20:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:20:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:20:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:20:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:20:09 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:20:09 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:20:09 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2016.06.16 20:20:09 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=a620598a 6f07bf00 . 2016.06.16 20:20:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:20:09 - OpenVPN > Validating certificate key usage . 2016.06.16 20:20:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:20:09 - OpenVPN > VERIFY KU OK . 2016.06.16 20:20:09 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:20:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:20:09 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:20:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:20:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:20:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:20:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:20:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:20:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:20:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.06.16 20:20:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:20:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.68 255.255.0.0' . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:20:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:20:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:20:20 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:20:20 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:20:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:20:21 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address LAN-Verbindung 5 dhcp . 2016.06.16 20:20:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.70.68/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:20:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.70.68/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:20:21 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:20:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:20:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:20:26 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:20:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:20:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:20:31 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:20:32 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:20:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:20:32 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:20:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:20:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:20:33 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:20:34 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.06.16 20:20:34 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:20:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:20:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:20:34 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:20:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:20:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:20:34 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:20:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:20:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:20:34 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:20:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:20:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:20:34 - Starting Management Interface . 2016.06.16 20:20:34 - OpenVPN > Initialization Sequence Completed I 2016.06.16 20:20:35 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:20:35 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:20:36 - Flushing DNS I 2016.06.16 20:20:36 - Checking route I 2016.06.16 20:20:37 - Checking DNS ! 2016.06.16 20:20:37 - Connected. . 2016.06.16 20:20:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.16 20:20:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.16 20:40:37 - Disconnecting . 2016.06.16 20:40:37 - Management - Send 'signal SIGTERM' . 2016.06.16 20:40:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:40:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:40:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:40:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:40:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:40:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:40:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:40:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:40:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:40:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:40:42 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:40:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:40:42 - Connection terminated. I 2016.06.16 20:40:43 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:40:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:40:46 - Checking authorization ... ! 2016.06.16 20:40:46 - Connecting to Gomeisa (Sweden, Uppsala) . 2016.06.16 20:40:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:40:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:40:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:40:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:40:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:40:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:40:46 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:40:46 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:40:46 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443 . 2016.06.16 20:40:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=0f38cbb6 4cc101ce . 2016.06.16 20:40:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:40:46 - OpenVPN > Validating certificate key usage . 2016.06.16 20:40:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:40:46 - OpenVPN > VERIFY KU OK . 2016.06.16 20:40:46 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:40:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:40:46 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:40:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:40:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:40:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:40:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:40:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:40:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:40:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.132:443 . 2016.06.16 20:40:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:40:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.46 255.255.0.0' . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:40:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:40:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:40:55 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:40:55 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:40:55 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:40:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.46.46/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:40:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.46.46/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:40:55 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:41:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:01 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:05 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:05 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:05 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:06 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:06 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:06 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:07 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:07 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:07 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:09 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:09 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:09 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:10 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:10 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:10 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:11 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:11 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:12 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:13 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:13 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:13 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:15 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:15 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:15 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:16 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:17 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:18 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:18 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:19 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:19 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:21 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:22 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:22 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:23 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:24 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:25 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:26 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:27 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:28 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:41:29 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:41:30 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:41:30 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:41:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:41:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:30 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:41:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:41:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:30 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:41:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:30 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:41:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:30 - OpenVPN > SYSTEM ROUTING TABLE . 2016.06.16 20:41:30 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.178.1 p=0 i=12 t=4 pr=3 a=1574 h=0 m=25/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=1257 h=0 m=276/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 10.4.70.68 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=1257 h=0 m=276/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=1257 h=0 m=276/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 62.102.148.132 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1613 h=0 m=306/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1613 h=0 m=306/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1613 h=0 m=306/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 192.168.178.0 255.255.255.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1574 h=0 m=281/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 192.168.178.1 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 192.168.178.29 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1574 h=0 m=281/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 192.168.178.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1574 h=0 m=281/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1613 h=0 m=306/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=1602 h=0 m=276/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1576 h=0 m=281/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1613 h=0 m=306/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=1602 h=0 m=276/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1576 h=0 m=281/0/0/0/0 . 2016.06.16 20:41:30 - OpenVPN > SYSTEM ADAPTER LIST . 2016.06.16 20:41:30 - OpenVPN > TAP-Windows Adapter V9 . 2016.06.16 20:41:30 - OpenVPN > Index = 35 . 2016.06.16 20:41:30 - OpenVPN > GUID = {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:41:30 - OpenVPN > IP = 10.4.70.68/255.255.0.0 . 2016.06.16 20:41:30 - OpenVPN > MAC = 00:ff:04:94:e1:06 . 2016.06.16 20:41:30 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > DHCP SERV = 10.4.255.254/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:20:36 2016 . 2016.06.16 20:41:30 - OpenVPN > DHCP LEASE EXPIRES = Fri Jun 16 20:20:36 2017 . 2016.06.16 20:41:30 - OpenVPN > DNS SERV = 10.4.0.1/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > Atheros AR9285 Wireless Network Adapter . 2016.06.16 20:41:30 - OpenVPN > Index = 12 . 2016.06.16 20:41:30 - OpenVPN > GUID = {86AFDC8A-88C6-4B73-8055-82157AA520EE} . 2016.06.16 20:41:30 - OpenVPN > IP = 192.168.178.29/255.255.255.0 . 2016.06.16 20:41:30 - OpenVPN > MAC = 74:f0:6d:78:20:f9 . 2016.06.16 20:41:30 - OpenVPN > GATEWAY = 192.168.178.1/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > DHCP SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:40:43 2016 . 2016.06.16 20:41:30 - OpenVPN > DHCP LEASE EXPIRES = Sun Jun 26 20:40:43 2016 . 2016.06.16 20:41:30 - OpenVPN > DNS SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > Atheros AR8131 PCI-E Gigabit Ethernet Controller (NDIS 6.20) . 2016.06.16 20:41:30 - OpenVPN > Index = 11 . 2016.06.16 20:41:30 - OpenVPN > GUID = {90A15B20-2965-4195-B9E4-225A0B6A9994} . 2016.06.16 20:41:30 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.06.16 20:41:30 - OpenVPN > MAC = 20:cf:30:11:85:c5 . 2016.06.16 20:41:30 - OpenVPN > GATEWAY = 192.168.178.100/255.255.255.255 . 2016.06.16 20:41:30 - OpenVPN > DNS SERV = . 2016.06.16 20:41:30 - Starting Management Interface . 2016.06.16 20:41:30 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) I 2016.06.16 20:41:30 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) ! 2016.06.16 20:41:30 - Disconnecting . 2016.06.16 20:41:30 - Management - Send 'signal SIGTERM' . 2016.06.16 20:41:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info I 2016.06.16 20:41:30 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:41:31 - Flushing DNS . 2016.06.16 20:41:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.06.16 20:41:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:41:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:41:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:41:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:41:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:41:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:41:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:41:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:41:35 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:41:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:41:35 - Connection terminated. I 2016.06.16 20:41:36 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:41:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:41:41 - Checking authorization ... ! 2016.06.16 20:41:42 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.06.16 20:41:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:41:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:41:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:41:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:41:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:41:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:41:42 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:41:42 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:41:42 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2016.06.16 20:41:42 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=4ce1462b 653c68d1 . 2016.06.16 20:41:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:41:42 - OpenVPN > Validating certificate key usage . 2016.06.16 20:41:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:41:42 - OpenVPN > VERIFY KU OK . 2016.06.16 20:41:42 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:41:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:41:42 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:41:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:41:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:41:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:41:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:41:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:41:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:41:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.06.16 20:41:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:41:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.68 255.255.0.0' . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:41:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:41:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:41:46 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:41:46 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:41:46 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:41:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.70.68/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:41:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.70.68/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:41:46 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:41:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.06.16 20:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:41:51 - Starting Management Interface . 2016.06.16 20:41:51 - OpenVPN > Initialization Sequence Completed I 2016.06.16 20:41:51 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:41:51 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:41:52 - Flushing DNS I 2016.06.16 20:41:52 - Checking route I 2016.06.16 20:41:52 - Checking DNS ! 2016.06.16 20:41:52 - Connected. . 2016.06.16 20:41:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.16 20:41:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.16 20:42:23 - Disconnecting . 2016.06.16 20:42:23 - Management - Send 'signal SIGTERM' . 2016.06.16 20:42:23 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:42:23 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:42:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:42:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:42:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:42:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:42:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:42:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:42:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:42:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:42:28 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:42:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:42:28 - Connection terminated. I 2016.06.16 20:42:28 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:42:28 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:42:31 - Checking authorization ... ! 2016.06.16 20:42:32 - Connecting to Kitalpha (Switzerland, Zurich) . 2016.06.16 20:42:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:42:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:42:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:42:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:42:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:42:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:42:32 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:42:32 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:42:32 - OpenVPN > UDPv4 link remote: [AF_INET]91.214.169.68:443 . 2016.06.16 20:42:32 - OpenVPN > TLS: Initial packet from [AF_INET]91.214.169.68:443, sid=6a90319d e4afb78e . 2016.06.16 20:42:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:42:32 - OpenVPN > Validating certificate key usage . 2016.06.16 20:42:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:42:32 - OpenVPN > VERIFY KU OK . 2016.06.16 20:42:32 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:42:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:42:32 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:42:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:42:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:42:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:42:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:42:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:42:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:42:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]91.214.169.68:443 . 2016.06.16 20:42:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:42:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.68 255.255.0.0' . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:42:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:42:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:42:43 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:42:43 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:42:43 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:42:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.68/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:42:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.68/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:42:43 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:42:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:48 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:53 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:54 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:56 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:57 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:58 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:42:59 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:42:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:42:59 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:01 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:02 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:03 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:04 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:04 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:04 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:06 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:06 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:06 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:07 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:07 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:07 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:08 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:08 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:08 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:09 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:09 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:09 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:11 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:11 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:12 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:13 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:13 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:13 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:14 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:15 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:16 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:43:17 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:43:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:43:18 - OpenVPN > C:\Windows\system32\route.exe ADD MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:43:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:43:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:18 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:43:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:43:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:43:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:43:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:18 - OpenVPN > SYSTEM ROUTING TABLE . 2016.06.16 20:43:18 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.178.1 p=0 i=12 t=4 pr=3 a=1681 h=0 m=25/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=89 h=0 m=276/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 10.4.70.68 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=89 h=0 m=276/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=89 h=0 m=276/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 91.214.169.68 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1720 h=0 m=306/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1720 h=0 m=306/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1720 h=0 m=306/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 192.168.178.0 255.255.255.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1681 h=0 m=281/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 192.168.178.1 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 192.168.178.29 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1681 h=0 m=281/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 192.168.178.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1681 h=0 m=281/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1720 h=0 m=306/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=1710 h=0 m=276/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1684 h=0 m=281/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1720 h=0 m=306/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=1710 h=0 m=276/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1684 h=0 m=281/0/0/0/0 . 2016.06.16 20:43:18 - OpenVPN > SYSTEM ADAPTER LIST . 2016.06.16 20:43:18 - OpenVPN > TAP-Windows Adapter V9 . 2016.06.16 20:43:18 - OpenVPN > Index = 35 . 2016.06.16 20:43:18 - OpenVPN > GUID = {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:43:18 - OpenVPN > IP = 10.4.70.68/255.255.0.0 . 2016.06.16 20:43:18 - OpenVPN > MAC = 00:ff:04:94:e1:06 . 2016.06.16 20:43:18 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > DHCP SERV = 10.4.255.254/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:41:52 2016 . 2016.06.16 20:43:18 - OpenVPN > DHCP LEASE EXPIRES = Fri Jun 16 20:41:52 2017 . 2016.06.16 20:43:18 - OpenVPN > DNS SERV = 10.4.0.1/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > Atheros AR9285 Wireless Network Adapter . 2016.06.16 20:43:18 - OpenVPN > Index = 12 . 2016.06.16 20:43:18 - OpenVPN > GUID = {86AFDC8A-88C6-4B73-8055-82157AA520EE} . 2016.06.16 20:43:18 - OpenVPN > IP = 192.168.178.29/255.255.255.0 . 2016.06.16 20:43:18 - OpenVPN > MAC = 74:f0:6d:78:20:f9 . 2016.06.16 20:43:18 - OpenVPN > GATEWAY = 192.168.178.1/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > DHCP SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:42:28 2016 . 2016.06.16 20:43:18 - OpenVPN > DHCP LEASE EXPIRES = Sun Jun 26 20:42:28 2016 . 2016.06.16 20:43:18 - OpenVPN > DNS SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > Atheros AR8131 PCI-E Gigabit Ethernet Controller (NDIS 6.20) . 2016.06.16 20:43:18 - OpenVPN > Index = 11 . 2016.06.16 20:43:18 - OpenVPN > GUID = {90A15B20-2965-4195-B9E4-225A0B6A9994} . 2016.06.16 20:43:18 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.06.16 20:43:18 - OpenVPN > MAC = 20:cf:30:11:85:c5 . 2016.06.16 20:43:18 - OpenVPN > GATEWAY = 192.168.178.100/255.255.255.255 . 2016.06.16 20:43:18 - OpenVPN > DNS SERV = . 2016.06.16 20:43:18 - Starting Management Interface . 2016.06.16 20:43:18 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) I 2016.06.16 20:43:18 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) ! 2016.06.16 20:43:18 - Disconnecting . 2016.06.16 20:43:18 - Management - Send 'signal SIGTERM' I 2016.06.16 20:43:18 - DNS of a network adapter forced (TAP-Windows Adapter V9) . 2016.06.16 20:43:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info I 2016.06.16 20:43:18 - Flushing DNS . 2016.06.16 20:43:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.06.16 20:43:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:43:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:43:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 91.214.169.68 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:43:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:43:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:43:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:43:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:43:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:43:23 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:43:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:43:24 - Connection terminated. I 2016.06.16 20:43:24 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:43:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:43:29 - Checking authorization ... ! 2016.06.16 20:43:29 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.06.16 20:43:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:43:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:43:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:43:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:43:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:43:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:43:30 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:43:30 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:43:30 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2016.06.16 20:43:30 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=2f470097 19c78a85 . 2016.06.16 20:43:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:43:30 - OpenVPN > Validating certificate key usage . 2016.06.16 20:43:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:43:30 - OpenVPN > VERIFY KU OK . 2016.06.16 20:43:30 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:43:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:43:30 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:43:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:43:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:43:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:43:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:43:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:43:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:43:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.06.16 20:43:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:43:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.68 255.255.0.0' . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:43:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:43:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:43:34 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:43:34 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:43:34 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:43:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.70.68/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:43:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.70.68/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:43:34 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:43:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.06.16 20:43:39 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:43:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:43:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:39 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:43:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:43:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:43:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:43:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:43:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:43:39 - Starting Management Interface . 2016.06.16 20:43:39 - OpenVPN > Initialization Sequence Completed I 2016.06.16 20:43:39 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:43:39 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:43:43 - Flushing DNS I 2016.06.16 20:43:43 - Checking route I 2016.06.16 20:43:43 - Checking DNS ! 2016.06.16 20:43:43 - Connected. . 2016.06.16 20:43:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.06.16 20:43:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2016.06.16 20:44:01 - Disconnecting . 2016.06.16 20:44:01 - Management - Send 'signal SIGTERM' . 2016.06.16 20:44:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:44:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:44:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:44:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:44:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:44:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:44:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:44:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:44:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:44:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:44:06 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:44:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:44:06 - Connection terminated. I 2016.06.16 20:44:06 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:44:06 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:44:09 - Checking authorization ... ! 2016.06.16 20:44:09 - Connecting to Bellatrix (United Kingdom, London) . 2016.06.16 20:44:10 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:44:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:44:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:44:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:44:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:44:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:44:10 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:44:10 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:44:10 - OpenVPN > UDPv4 link remote: [AF_INET]88.150.240.7:443 . 2016.06.16 20:44:10 - OpenVPN > TLS: Initial packet from [AF_INET]88.150.240.7:443, sid=6dfab106 3f0abb3a . 2016.06.16 20:44:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:44:15 - OpenVPN > Validating certificate key usage . 2016.06.16 20:44:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:44:15 - OpenVPN > VERIFY KU OK . 2016.06.16 20:44:15 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:44:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:44:15 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:44:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:44:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:44:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:44:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:44:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:44:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:44:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]88.150.240.7:443 . 2016.06.16 20:44:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:44:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.42 255.255.0.0' . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:44:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:44:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:44:20 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:44:20 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:44:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:44:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.42/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:44:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.42/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:44:20 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:44:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:25 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:30 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:30 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:32 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:32 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:33 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:34 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:35 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:35 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:37 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:38 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:38 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:38 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:39 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:40 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:41 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:42 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:43 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:44 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:45 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:46 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:47 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:48 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:50 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:51 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:52 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:52 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:53 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.06.16 20:44:54 - AirVPN Windows Interface Hack executed (LAN-Verbindung 5) . 2016.06.16 20:44:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.06.16 20:44:55 - OpenVPN > C:\Windows\system32\route.exe ADD 88.150.240.7 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:44:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:44:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:44:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:44:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:44:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:44:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:44:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:44:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:44:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:44:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:44:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:44:55 - OpenVPN > SYSTEM ROUTING TABLE . 2016.06.16 20:44:55 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.178.1 p=0 i=12 t=4 pr=3 a=1778 h=0 m=25/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=75 h=0 m=276/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 10.4.70.68 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=75 h=0 m=276/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=75 h=0 m=276/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 88.150.240.7 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1817 h=0 m=306/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1817 h=0 m=306/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1817 h=0 m=306/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=35 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 192.168.178.0 255.255.255.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1778 h=0 m=281/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 192.168.178.1 255.255.255.255 192.168.178.1 p=0 i=12 t=4 pr=3 a=0 h=0 m=25/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 192.168.178.29 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1778 h=0 m=281/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 192.168.178.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1778 h=0 m=281/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=1817 h=0 m=306/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.70.68 p=0 i=35 t=3 pr=3 a=1807 h=0 m=276/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.178.29 p=0 i=12 t=3 pr=3 a=1781 h=0 m=281/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=1817 h=0 m=306/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.70.68 p=0 i=35 t=3 pr=3 a=1807 h=0 m=276/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.178.29 p=0 i=12 t=3 pr=3 a=1781 h=0 m=281/0/0/0/0 . 2016.06.16 20:44:55 - OpenVPN > SYSTEM ADAPTER LIST . 2016.06.16 20:44:55 - OpenVPN > TAP-Windows Adapter V9 . 2016.06.16 20:44:55 - OpenVPN > Index = 35 . 2016.06.16 20:44:55 - OpenVPN > GUID = {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:44:55 - OpenVPN > IP = 10.4.70.68/255.255.0.0 . 2016.06.16 20:44:55 - OpenVPN > MAC = 00:ff:04:94:e1:06 . 2016.06.16 20:44:55 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > DHCP SERV = 10.4.255.254/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:43:43 2016 . 2016.06.16 20:44:55 - OpenVPN > DHCP LEASE EXPIRES = Fri Jun 16 20:43:43 2017 . 2016.06.16 20:44:55 - OpenVPN > DNS SERV = 10.4.0.1/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > Atheros AR9285 Wireless Network Adapter . 2016.06.16 20:44:55 - OpenVPN > Index = 12 . 2016.06.16 20:44:55 - OpenVPN > GUID = {86AFDC8A-88C6-4B73-8055-82157AA520EE} . 2016.06.16 20:44:55 - OpenVPN > IP = 192.168.178.29/255.255.255.0 . 2016.06.16 20:44:55 - OpenVPN > MAC = 74:f0:6d:78:20:f9 . 2016.06.16 20:44:55 - OpenVPN > GATEWAY = 192.168.178.1/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > DHCP SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > DHCP LEASE OBTAINED = Thu Jun 16 20:44:06 2016 . 2016.06.16 20:44:55 - OpenVPN > DHCP LEASE EXPIRES = Sun Jun 26 20:44:06 2016 . 2016.06.16 20:44:55 - OpenVPN > DNS SERV = 192.168.178.1/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > Atheros AR8131 PCI-E Gigabit Ethernet Controller (NDIS 6.20) . 2016.06.16 20:44:55 - OpenVPN > Index = 11 . 2016.06.16 20:44:55 - OpenVPN > GUID = {90A15B20-2965-4195-B9E4-225A0B6A9994} . 2016.06.16 20:44:55 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.06.16 20:44:55 - OpenVPN > MAC = 20:cf:30:11:85:c5 . 2016.06.16 20:44:55 - OpenVPN > GATEWAY = 192.168.178.100/255.255.255.255 . 2016.06.16 20:44:55 - OpenVPN > DNS SERV = . 2016.06.16 20:44:55 - Starting Management Interface . 2016.06.16 20:44:55 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) ! 2016.06.16 20:44:55 - Disconnecting I 2016.06.16 20:44:55 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) . 2016.06.16 20:44:55 - Management - Send 'signal SIGTERM' . 2016.06.16 20:44:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info I 2016.06.16 20:44:55 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:44:55 - Flushing DNS . 2016.06.16 20:44:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.06.16 20:44:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.16 20:44:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.06.16 20:45:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 88.150.240.7 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:45:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:45:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.178.1 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:45:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:45:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:45:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:45:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:45:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.06.16 20:45:00 - OpenVPN > Closing TUN/TAP interface . 2016.06.16 20:45:00 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.06.16 20:45:00 - Connection terminated. I 2016.06.16 20:45:00 - DNS of a network adapter restored to original settings (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:45:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.06.16 20:45:06 - Checking authorization ... ! 2016.06.16 20:45:07 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.06.16 20:45:07 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.06.16 20:45:07 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.16 20:45:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.16 20:45:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.16 20:45:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:45:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:45:07 - OpenVPN > Socket Buffers: R=[131072->262144] S=[49152->262144] . 2016.06.16 20:45:07 - OpenVPN > UDPv4 link local: [undef] . 2016.06.16 20:45:07 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2016.06.16 20:45:07 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=1f177629 01ccfce4 . 2016.06.16 20:45:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.16 20:45:07 - OpenVPN > Validating certificate key usage . 2016.06.16 20:45:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.16 20:45:07 - OpenVPN > VERIFY KU OK . 2016.06.16 20:45:07 - OpenVPN > Validating certificate extended key usage . 2016.06.16 20:45:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.16 20:45:07 - OpenVPN > VERIFY EKU OK . 2016.06.16 20:45:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.16 20:45:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:45:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:45:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.16 20:45:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.16 20:45:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.16 20:45:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.06.16 20:45:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.16 20:45:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.68 255.255.0.0' . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.16 20:45:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.16 20:45:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.16 20:45:11 - OpenVPN > open_tun, tt->ipv6=0 . 2016.06.16 20:45:11 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{0494E106-6CCF-4006-9C1A-3261AA9F8390}.tap . 2016.06.16 20:45:11 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.06.16 20:45:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.70.68/255.255.0.0 [sUCCEEDED] . 2016.06.16 20:45:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.70.68/255.255.0.0 on interface {0494E106-6CCF-4006-9C1A-3261AA9F8390} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.06.16 20:45:11 - OpenVPN > Successful ARP Flush on interface [35] {0494E106-6CCF-4006-9C1A-3261AA9F8390} . 2016.06.16 20:45:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.06.16 20:45:16 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.178.1 . 2016.06.16 20:45:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:45:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:45:16 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 12 . 2016.06.16 20:45:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.06.16 20:45:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:45:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:45:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:45:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:45:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.06.16 20:45:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.06.16 20:45:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.06.16 20:45:16 - Starting Management Interface . 2016.06.16 20:45:16 - OpenVPN > Initialization Sequence Completed I 2016.06.16 20:45:16 - DNS of a network adapter forced (Atheros AR9285 Wireless Network Adapter) I 2016.06.16 20:45:16 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.06.16 20:45:20 - Flushing DNS I 2016.06.16 20:45:20 - Checking route I 2016.06.16 20:45:20 - Checking DNS ! 2016.06.16 20:45:20 - Connected. . 2016.06.16 20:45:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.16 20:45:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.06.16 20:50:51 - Updating systems & servers data ... . 2016.06.16 20:50:52 - Systems & servers data update completed The Network Lock is also not working because the Lock is installed but i cannot connect to any server Any Fix for this Problem?
-
Just became a member today but I can't seem to connect to any server. The connection keeps on getting terminated. It's just running a loop really. I've reset my hosts file via this link: http://osxdaily.com/2014/04/12/restore-original-hosts-file-mac/ But still no luck... Running OS X 10.8.5 . 2015.02.25 19:04:11 - Updating systems & servers data ... . 2015.02.25 19:04:12 - Systems & servers data update completed! 2015.02.25 19:04:44 - Activation of Network Lock - OS X - PF. 2015.02.25 19:04:44 - OS X - PF rules updated, reloadingI 2015.02.25 19:04:48 - Session starting.I 2015.02.25 19:04:48 - Installing tunnel driverI 2015.02.25 19:04:48 - Checking authorization ...! 2015.02.25 19:04:49 - Connecting to Kraz (Canada, Toronto, Ontario). 2015.02.25 19:04:49 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015. 2015.02.25 19:04:49 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.02.25 19:04:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.25 19:04:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.25 19:04:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.25 19:04:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.25 19:04:49 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2015.02.25 19:04:49 - OpenVPN > UDPv4 link local: [undef]. 2015.02.25 19:04:49 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.61:443. 2015.02.25 19:04:49 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=227f7712 1770586e. 2015.02.25 19:04:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.02.25 19:04:49 - OpenVPN > Validating certificate key usage. 2015.02.25 19:04:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.02.25 19:04:49 - OpenVPN > VERIFY KU OK. 2015.02.25 19:04:49 - OpenVPN > Validating certificate extended key usage. 2015.02.25 19:04:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.02.25 19:04:49 - OpenVPN > VERIFY EKU OK. 2015.02.25 19:04:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.02.25 19:04:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.25 19:04:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.25 19:04:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.25 19:04:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.25 19:04:50 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.02.25 19:04:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443. 2015.02.25 19:04:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.02.25 19:04:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.43.94 10.4.43.93'. 2015.02.25 19:04:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.02.25 19:04:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.02.25 19:04:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.02.25 19:04:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.02.25 19:04:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.02.25 19:04:52 - OpenVPN > dyld: lazy symbol binding failed: Symbol not found: ___strlcpy_chk. 2015.02.25 19:04:52 - OpenVPN > Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn. 2015.02.25 19:04:52 - OpenVPN > Expected in: /usr/lib/libSystem.B.dylib. 2015.02.25 19:04:52 - OpenVPN >. 2015.02.25 19:04:52 - OpenVPN > dyld: Symbol not found: ___strlcpy_chk. 2015.02.25 19:04:52 - OpenVPN > Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn. 2015.02.25 19:04:52 - OpenVPN > Expected in: /usr/lib/libSystem.B.dylib. 2015.02.25 19:04:52 - OpenVPN >! 2015.02.25 19:04:53 - Disconnecting. 2015.02.25 19:04:53 - Connection terminated.
-
Hi All. I am a noob if it goes about VPN. I have installed AirVpn client and I try to connect to a server in Netherland, but just after I'm connected client disconnects and tries to reconnect. Any ideas what cause it? I work on Windows 7 Enterprise 64bit. I'm attaching my log. Thank you for your help. I 2014.10.19 00:52:16 - Session starting.! 2014.10.19 00:52:16 - Checking environment! 2014.10.19 00:52:17 - Checking authorization! 2014.10.19 00:52:17 - Connecting to Grafias (Netherlands, Amsterdam). 2014.10.19 00:52:17 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014. 2014.10.19 00:52:17 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05. 2014.10.19 00:52:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2014.10.19 00:52:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2014.10.19 00:52:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.19 00:52:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.19 00:52:17 - OpenVPN > Socket Buffers: R=[8192->8192] S=[64512->64512]. 2014.10.19 00:52:17 - OpenVPN > UDPv4 link local: [undef]. 2014.10.19 00:52:17 - OpenVPN > UDPv4 link remote: [AF_INET]62.212.72.175:443. 2014.10.19 00:52:17 - OpenVPN > TLS: Initial packet from [AF_INET]62.212.72.175:443, sid=127a7e95 c34d41a3. 2014.10.19 00:52:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2014.10.19 00:52:18 - OpenVPN > Validating certificate key usage. 2014.10.19 00:52:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2014.10.19 00:52:18 - OpenVPN > VERIFY KU OK. 2014.10.19 00:52:18 - OpenVPN > Validating certificate extended key usage. 2014.10.19 00:52:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2014.10.19 00:52:18 - OpenVPN > VERIFY EKU OK. 2014.10.19 00:52:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2014.10.19 00:52:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.19 00:52:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.19 00:52:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.19 00:52:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.19 00:52:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2014.10.19 00:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.212.72.175:443. 2014.10.19 00:52:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2014.10.19 00:52:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.19.230 10.4.19.229'. 2014.10.19 00:52:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2014.10.19 00:52:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2014.10.19 00:52:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2014.10.19 00:52:24 - OpenVPN > OPTIONS IMPORT: route options modified. 2014.10.19 00:52:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2014.10.19 00:52:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2014.10.19 00:52:24 - OpenVPN > open_tun, tt->ipv6=0. 2014.10.19 00:52:24 - OpenVPN > TAP-WIN32 device [Połączenie lokalne 3] opened: \\.\Global\{BADF76DC-0AFB-4AEC-9AE7-AD0F2616AAE2}.tap. 2014.10.19 00:52:24 - OpenVPN > TAP-Windows Driver Version 9.9. 2014.10.19 00:52:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.19.230/255.255.255.252 on interface {BADF76DC-0AFB-4AEC-9AE7-AD0F2616AAE2} [DHCP-serv: 10.4.19.229, lease-time: 31536000]. 2014.10.19 00:52:24 - OpenVPN > Successful ARP Flush on interface [31] {BADF76DC-0AFB-4AEC-9AE7-AD0F2616AAE2}. 2014.10.19 00:52:29 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2014.10.19 00:52:29 - OpenVPN > C:\Windows\system32\route.exe ADD 62.212.72.175 MASK 255.255.255.255 192.168.1.254. 2014.10.19 00:52:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.19 00:52:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.19 00:52:29 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.19.229. 2014.10.19 00:52:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2014.10.19 00:52:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.19 00:52:29 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.19.229. 2014.10.19 00:52:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2014.10.19 00:52:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.19 00:52:29 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.19.229. 2014.10.19 00:52:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2014.10.19 00:52:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.19 00:52:29 - Starting Management Interface. 2014.10.19 00:52:29 - OpenVPN > Initialization Sequence Completed! 2014.10.19 00:52:29 - Flushing DNSW 2014.10.19 00:52:30 - Tunnel not ready, interface status: Down. 2014.10.19 00:52:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2014.10.19 00:52:30 - Disconnecting. 2014.10.19 00:52:30 - Management - Send 'signal SIGTERM'. 2014.10.19 00:52:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2014.10.19 00:52:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2014.10.19 00:52:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2014.10.19 00:52:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.19.229. 2014.10.19 00:52:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.19 00:52:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.212.72.175 MASK 255.255.255.255 192.168.1.254. 2014.10.19 00:52:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.19 00:52:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.19.229. 2014.10.19 00:52:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.19 00:52:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.19.229. 2014.10.19 00:52:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.19 00:52:35 - OpenVPN > Closing TUN/TAP interface. 2014.10.19 00:52:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2014.10.19 00:52:35 - Connection terminated.I 2014.10.19 00:52:37 - Cancel requested.I 2014.10.19 00:52:37 - Session terminated.