Jump to content
Not connected, Your IP: 3.214.184.124

Search the Community

Showing results for tags 'not connecting'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 4 results

  1. Hi - Was wondering if anyone could help me on this. EDDIE was taking about 12 attempts to connect each time previously, citing the 'IPv6 is disabled at OS level' message repeatedly, BUT it would eventually connect. I have since upgraded to 2.16.3 but must've done something to the settings, as now it just hangs and hangs, re-starting from server to server. I cannot connect to the internet either through EDDIE or outside of EDDIE, regardless of network lock status? Latest attempt logs show this: . 2019.04.06 16:53:22 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2019.04.06 16:53:22 - Reading options from C:\Program Files\AirVPN\default.xml. 2019.04.06 16:53:22 - Command line arguments (0):. 2019.04.06 16:53:22 - Profile path: C:\Program Files\AirVPN\default.xml. 2019.04.06 16:53:25 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2019.04.06 16:53:25 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2019.04.06 16:53:25 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2019.04.06 16:53:25 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2019.04.06 16:53:25 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2019.04.06 16:53:25 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2019.04.06 16:53:26 - Updating systems & servers data ...I 2019.04.06 16:53:27 - Ready. 2019.04.06 16:53:27 - Systems & servers data update completed! 2019.04.06 16:53:33 - Activation of Network Lock - Windows Filtering PlatformI 2019.04.06 16:53:34 - Session starting.I 2019.04.06 16:53:35 - Checking authorization .... 2019.04.06 16:53:36 - IPv6 disabled with packet filtering.! 2019.04.06 16:53:36 - Connecting to Capricornus (Belgium, Brussels). 2019.04.06 16:53:36 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:53:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:53:36 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:53:36 - Connection to OpenVPN Management Interface. 2019.04.06 16:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:53:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:53:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:53:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:53:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.93:443. 2019.04.06 16:53:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:53:36 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:53:36 - OpenVPN > UDP link remote: [AF_INET]194.187.251.93:443. 2019.04.06 16:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:54:08 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:54:08 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:54:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:54:13 - Disconnecting. 2019.04.06 16:54:13 - Connection terminated.. 2019.04.06 16:54:13 - IPv6 restored with packet filtering.I 2019.04.06 16:54:16 - Checking authorization .... 2019.04.06 16:54:17 - IPv6 disabled with packet filtering.! 2019.04.06 16:54:17 - Connecting to Mebsuta (Belgium, Brussels). 2019.04.06 16:54:17 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:54:17 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:54:17 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:54:17 - Connection to OpenVPN Management Interface. 2019.04.06 16:54:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:54:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:54:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:54:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:54:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:54:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.157:443. 2019.04.06 16:54:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:54:17 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:54:17 - OpenVPN > UDP link remote: [AF_INET]194.187.251.157:443. 2019.04.06 16:54:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:54:49 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:54:49 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:54:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:54:54 - Disconnecting. 2019.04.06 16:54:54 - Connection terminated.. 2019.04.06 16:54:54 - IPv6 restored with packet filtering.I 2019.04.06 16:54:57 - Checking authorization .... 2019.04.06 16:54:57 - IPv6 disabled with packet filtering.! 2019.04.06 16:54:57 - Connecting to Tarazed (Netherlands, Alblasserdam). 2019.04.06 16:54:57 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:54:57 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:54:57 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:54:57 - Connection to OpenVPN Management Interface. 2019.04.06 16:54:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:54:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:54:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:54:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:54:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:54:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.135:443. 2019.04.06 16:54:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:54:57 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:54:57 - OpenVPN > UDP link remote: [AF_INET]213.152.161.135:443. 2019.04.06 16:54:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:55:29 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:55:29 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:55:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:55:34 - Disconnecting. 2019.04.06 16:55:34 - Connection terminated.. 2019.04.06 16:55:34 - IPv6 restored with packet filtering.I 2019.04.06 16:55:37 - Checking authorization .... 2019.04.06 16:55:38 - IPv6 disabled with packet filtering.! 2019.04.06 16:55:38 - Connecting to Diadema (Belgium, Brussels). 2019.04.06 16:55:38 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:55:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:55:38 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:55:38 - Connection to OpenVPN Management Interface. 2019.04.06 16:55:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:55:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:55:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:55:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:55:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:55:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.165:443. 2019.04.06 16:55:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:55:38 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:55:38 - OpenVPN > UDP link remote: [AF_INET]194.187.251.165:443. 2019.04.06 16:55:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:56:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:56:11 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:56:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:56:16 - Disconnecting. 2019.04.06 16:56:16 - Connection terminated.. 2019.04.06 16:56:16 - IPv6 restored with packet filtering.I 2019.04.06 16:56:19 - Checking authorization .... 2019.04.06 16:56:19 - IPv6 disabled with packet filtering.! 2019.04.06 16:56:19 - Connecting to Skat (Netherlands, Alblasserdam). 2019.04.06 16:56:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:56:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:56:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:56:19 - Connection to OpenVPN Management Interface. 2019.04.06 16:56:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:56:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:56:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:56:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:56:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:56:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.76:443. 2019.04.06 16:56:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:56:19 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:56:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.76:443. 2019.04.06 16:56:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:56:51 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:56:51 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:56:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:56:56 - Disconnecting. 2019.04.06 16:56:56 - Connection terminated.. 2019.04.06 16:56:56 - IPv6 restored with packet filtering.I 2019.04.06 16:56:59 - Checking authorization ...W 2019.04.06 16:57:00 - The server supports IPv6, but IPv6 is disabled at OS level. You need to re-enable it manually (reboot is required) or disable this warning by setting Preferences > Networking > Layer IPv6: Block.W 2019.04.06 16:57:00 - 'Preferences > Networking > Layer IPv6' automatically switched to 'Block'.. 2019.04.06 16:57:00 - IPv6 disabled with packet filtering.! 2019.04.06 16:57:00 - Connecting to Canis (Netherlands, Alblasserdam). 2019.04.06 16:57:00 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:57:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:57:00 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:57:00 - Connection to OpenVPN Management Interface. 2019.04.06 16:57:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:57:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:57:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:57:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:57:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:57:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.221:443. 2019.04.06 16:57:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:57:00 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:57:00 - OpenVPN > UDP link remote: [AF_INET]213.152.161.221:443. 2019.04.06 16:57:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:57:32 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:57:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:57:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:57:38 - Disconnecting. 2019.04.06 16:57:38 - Connection terminated.. 2019.04.06 16:57:38 - IPv6 restored with packet filtering.I 2019.04.06 16:57:41 - Checking authorization .... 2019.04.06 16:57:41 - IPv6 disabled with packet filtering.! 2019.04.06 16:57:41 - Connecting to Subra (Netherlands, Alblasserdam). 2019.04.06 16:57:42 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:57:42 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:57:42 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:57:42 - Connection to OpenVPN Management Interface. 2019.04.06 16:57:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:57:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:57:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:57:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:57:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:57:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.101:443. 2019.04.06 16:57:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:57:42 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:57:42 - OpenVPN > UDP link remote: [AF_INET]213.152.162.101:443. 2019.04.06 16:57:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.04.06 16:58:13 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2019.04.06 16:58:13 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.04.06 16:58:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2019.04.06 16:58:18 - Disconnecting. 2019.04.06 16:58:18 - Connection terminated.. 2019.04.06 16:58:18 - IPv6 restored with packet filtering.I 2019.04.06 16:58:21 - Checking authorization .... 2019.04.06 16:58:23 - IPv6 disabled with packet filtering.! 2019.04.06 16:58:23 - Connecting to Sheliak (Netherlands, Alblasserdam). 2019.04.06 16:58:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.04.06 16:58:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.04.06 16:58:23 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2019.04.06 16:58:23 - Connection to OpenVPN Management Interface. 2019.04.06 16:58:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.04.06 16:58:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:58:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:58:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.04.06 16:58:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.04.06 16:58:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.116:443. 2019.04.06 16:58:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.04.06 16:58:23 - OpenVPN > UDP link local: (not bound). 2019.04.06 16:58:23 - OpenVPN > UDP link remote: [AF_INET]213.152.162.116:443. 2019.04.06 16:58:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 Connection is via WIFI, but has always been this way and usually works. I have tried various configurations/DNS details, but doesn't seem to make any difference, so I just reset to automatic? I have tried several re-starts of both EDDIE, its settings, and Windows. If anyone can shed any light I'd very much appreciate it? Thanks
  2. Noob here. AirVPN seems to be unable to connect to any server (including the recommended ones). Any help would be much appreciated. Here are the logs. . 2016.01.29 17:17:17 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:17:17 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:17:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=6b07d67a 48bba259. 2016.01.29 17:17:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:17:17 - OpenVPN > Validating certificate key usage. 2016.01.29 17:17:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:17:17 - OpenVPN > VERIFY KU OK. 2016.01.29 17:17:17 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:17:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:17:17 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:17:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:17:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:17:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:17:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:17:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:17:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:17:20 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:17:20 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:17:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:17:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:21 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:26 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:32 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:37 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:37 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:41 - OpenVPN > NETSH: command failed. 2016.01.29 17:17:41 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:17:41 - Disconnecting. 2016.01.29 17:17:41 - Connection terminated.I 2016.01.29 17:17:44 - Checking authorization ...! 2016.01.29 17:17:44 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:17:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:17:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:17:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:17:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:17:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:45 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:17:45 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:17:45 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:17:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1ac16a51 5717bbd0. 2016.01.29 17:17:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:17:45 - OpenVPN > Validating certificate key usage. 2016.01.29 17:17:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:17:45 - OpenVPN > VERIFY KU OK. 2016.01.29 17:17:45 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:17:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:17:45 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:17:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:17:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:17:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:17:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:17:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:17:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:17:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:17:50 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:17:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:17:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:06 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:06 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:10 - OpenVPN > NETSH: command failed. 2016.01.29 17:18:10 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:18:10 - Disconnecting. 2016.01.29 17:18:10 - Connection terminated.I 2016.01.29 17:18:13 - Checking authorization ...! 2016.01.29 17:18:13 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:18:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:18:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:18:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:18:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:18:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:14 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:18:14 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:18:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:18:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=6c9fe633 c8bdf0d7. 2016.01.29 17:18:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:18:14 - OpenVPN > Validating certificate key usage. 2016.01.29 17:18:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:18:14 - OpenVPN > VERIFY KU OK. 2016.01.29 17:18:14 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:18:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:18:14 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:18:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:18:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:18:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:18:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:18:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:18:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:18:17 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:18:17 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:18:17 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:18:18 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:18 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:23 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:23 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:28 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:29 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:34 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:34 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:38 - OpenVPN > NETSH: command failed. 2016.01.29 17:18:38 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:18:38 - Disconnecting. 2016.01.29 17:18:38 - Connection terminated.I 2016.01.29 17:18:41 - Checking authorization ...! 2016.01.29 17:18:41 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:18:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:18:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:18:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:18:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:18:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:18:42 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:18:42 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:18:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=d1508e0a a854f080. 2016.01.29 17:18:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:18:42 - OpenVPN > Validating certificate key usage. 2016.01.29 17:18:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:18:42 - OpenVPN > VERIFY KU OK. 2016.01.29 17:18:42 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:18:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:18:42 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:18:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:18:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:18:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:18:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:18:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:18:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:18:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:18:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:18:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:18:45 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:18:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:18:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:46 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:05 - OpenVPN > NETSH: command failed. 2016.01.29 17:19:05 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:19:05 - Disconnecting. 2016.01.29 17:19:05 - Connection terminated.I 2016.01.29 17:19:09 - Checking authorization ...! 2016.01.29 17:19:09 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:19:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:19:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:19:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:19:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:19:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:09 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:19:09 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:19:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:19:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=fd9cd1c2 86bd646c. 2016.01.29 17:19:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:19:10 - OpenVPN > Validating certificate key usage. 2016.01.29 17:19:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:19:10 - OpenVPN > VERIFY KU OK. 2016.01.29 17:19:10 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:19:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:19:10 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:19:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:19:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:19:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:19:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:19:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:19:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:19:13 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:19:13 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:19:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:19:14 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:14 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:19 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:24 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:34 - OpenVPN > NETSH: command failed. 2016.01.29 17:19:34 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:19:34 - Disconnecting. 2016.01.29 17:19:34 - Connection terminated.I 2016.01.29 17:19:37 - Checking authorization ...! 2016.01.29 17:19:37 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:19:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:19:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:19:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:19:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:19:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:19:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:19:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:19:40 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=3bee3ef7 0e6c37a8. 2016.01.29 17:19:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:19:40 - OpenVPN > Validating certificate key usage. 2016.01.29 17:19:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:19:40 - OpenVPN > VERIFY KU OK. 2016.01.29 17:19:40 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:19:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:19:40 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:19:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:19:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:19:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:19:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:19:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:19:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:19:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:19:48 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:19:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:19:49 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:50 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:55 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:20:02 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:07 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:20:07 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:11 - OpenVPN > NETSH: command failed. 2016.01.29 17:20:11 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:20:11 - Disconnecting. 2016.01.29 17:20:11 - Connection terminated.I 2016.01.29 17:20:11 - Cancel requested.I 2016.01.29 17:20:11 - IPv6 restored.! 2016.01.29 17:20:11 - Session terminated.I 2016.01.29 17:21:22 - Session starting.I 2016.01.29 17:21:22 - IPv6 disabled.I 2016.01.29 17:21:22 - Checking authorization ...! 2016.01.29 17:21:23 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:21:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:21:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:21:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:21:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:21:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:23 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:21:23 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:21:23 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:21:23 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=9743bc5c 44acc1e6. 2016.01.29 17:21:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:21:23 - OpenVPN > Validating certificate key usage. 2016.01.29 17:21:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:21:23 - OpenVPN > VERIFY KU OK. 2016.01.29 17:21:23 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:21:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:21:23 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:21:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:21:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:21:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:21:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:21:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:21:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:21:26 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:21:26 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:21:26 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:21:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:28 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:33 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:38 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:38 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:43 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:43 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:47 - OpenVPN > NETSH: command failed. 2016.01.29 17:21:47 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:21:47 - Disconnecting. 2016.01.29 17:21:47 - Connection terminated.I 2016.01.29 17:21:51 - Checking authorization ...! 2016.01.29 17:21:51 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:21:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:21:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:21:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:21:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:21:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:21:51 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:21:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:21:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=da66502f 67a9779f. 2016.01.29 17:21:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:21:52 - OpenVPN > Validating certificate key usage. 2016.01.29 17:21:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:21:52 - OpenVPN > VERIFY KU OK. 2016.01.29 17:21:52 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:21:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:21:52 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:21:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:21:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:21:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:21:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:21:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:21:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:21:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:21:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:21:55 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:21:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:21:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:06 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:06 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:11 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:11 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:15 - OpenVPN > NETSH: command failed. 2016.01.29 17:22:15 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:22:16 - Disconnecting. 2016.01.29 17:22:16 - Connection terminated.I 2016.01.29 17:22:19 - Checking authorization ...! 2016.01.29 17:22:19 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:22:19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:22:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:22:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:22:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:22:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:22:19 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:22:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:22:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=a6716048 3abce732. 2016.01.29 17:22:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:22:19 - OpenVPN > Validating certificate key usage. 2016.01.29 17:22:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:22:19 - OpenVPN > VERIFY KU OK. 2016.01.29 17:22:19 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:22:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:22:19 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:22:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:22:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:22:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:22:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:22:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:22:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:22:22 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:22:23 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:22:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:22:23 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:24 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:29 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:29 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:34 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:35 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:40 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:44 - OpenVPN > NETSH: command failed. 2016.01.29 17:22:44 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:22:44 - Disconnecting. 2016.01.29 17:22:44 - Connection terminated.I 2016.01.29 17:22:47 - Checking authorization ...! 2016.01.29 17:22:47 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:22:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:22:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:22:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:22:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:22:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:22:48 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:22:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:22:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=cebc831f 7e70887a. 2016.01.29 17:22:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:22:48 - OpenVPN > Validating certificate key usage. 2016.01.29 17:22:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:22:48 - OpenVPN > VERIFY KU OK. 2016.01.29 17:22:48 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:22:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:22:48 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:22:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:22:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:22:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:22:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:22:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:22:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:22:51 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:22:51 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:22:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:22:52 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:52 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:57 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:03 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:03 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:08 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:08 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:12 - OpenVPN > NETSH: command failed. 2016.01.29 17:23:12 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:23:12 - Disconnecting. 2016.01.29 17:23:12 - Connection terminated.I 2016.01.29 17:23:15 - Checking authorization ...! 2016.01.29 17:23:16 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:23:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:23:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:23:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:23:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:23:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:16 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:23:16 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:23:16 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:23:16 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=e0eb46cc 9d952c57. 2016.01.29 17:23:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:23:16 - OpenVPN > Validating certificate key usage. 2016.01.29 17:23:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:23:16 - OpenVPN > VERIFY KU OK. 2016.01.29 17:23:16 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:23:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:23:16 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:23:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:23:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:23:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:23:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:23:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:23:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:23:19 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:23:19 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:23:19 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:23:20 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:20 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:25 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:31 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:36 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:36 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:40 - OpenVPN > NETSH: command failed. 2016.01.29 17:23:40 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:23:40 - Disconnecting. 2016.01.29 17:23:40 - Connection terminated.I 2016.01.29 17:23:43 - Checking authorization ...! 2016.01.29 17:23:44 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:23:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:23:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:23:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:23:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:23:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:44 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:23:44 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:23:44 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:23:44 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=54aff796 1bf4cec9. 2016.01.29 17:23:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:23:45 - OpenVPN > Validating certificate key usage. 2016.01.29 17:23:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:23:45 - OpenVPN > VERIFY KU OK. 2016.01.29 17:23:45 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:23:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:23:45 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:23:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:23:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:23:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:23:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:23:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:23:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:23:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:23:48 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:23:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:23:49 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:49 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:54 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:54 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:00 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:05 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:09 - OpenVPN > NETSH: command failed. 2016.01.29 17:24:09 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:24:09 - Disconnecting. 2016.01.29 17:24:09 - Connection terminated.I 2016.01.29 17:24:12 - Checking authorization ...! 2016.01.29 17:24:12 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:24:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:24:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:24:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:24:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:24:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:13 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:24:13 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:24:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:24:15 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1226d483 0b335ecd. 2016.01.29 17:24:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:24:15 - OpenVPN > Validating certificate key usage. 2016.01.29 17:24:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:24:15 - OpenVPN > VERIFY KU OK. 2016.01.29 17:24:15 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:24:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:24:15 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:24:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:24:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:24:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:24:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:24:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:24:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:24:18 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:24:19 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:24:19 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:24:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:20 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:25 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:35 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:35 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:39 - OpenVPN > NETSH: command failed. 2016.01.29 17:24:39 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:24:39 - Disconnecting. 2016.01.29 17:24:39 - Connection terminated.I 2016.01.29 17:24:43 - Checking authorization ...! 2016.01.29 17:24:43 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:24:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:24:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:24:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:24:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:24:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:43 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:24:43 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:24:43 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:24:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=10f5d139 36348a4b. 2016.01.29 17:24:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:24:44 - OpenVPN > Validating certificate key usage. 2016.01.29 17:24:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:24:44 - OpenVPN > VERIFY KU OK. 2016.01.29 17:24:44 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:24:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:24:44 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:24:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:24:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:24:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:24:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:24:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:24:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:24:46 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:24:47 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:24:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:24:47 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:48 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:53 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:53 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:58 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:03 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:03 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:07 - OpenVPN > NETSH: command failed. 2016.01.29 17:25:07 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:25:07 - Disconnecting. 2016.01.29 17:25:07 - Connection terminated.I 2016.01.29 17:25:11 - Checking authorization ...! 2016.01.29 17:25:11 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:25:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:25:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:25:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:25:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:25:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:11 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:25:11 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:25:11 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:25:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=9720d124 d8b78a9f. 2016.01.29 17:25:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:25:11 - OpenVPN > Validating certificate key usage. 2016.01.29 17:25:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:25:11 - OpenVPN > VERIFY KU OK. 2016.01.29 17:25:11 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:25:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:25:11 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:25:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:25:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:25:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:25:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:25:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:25:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:25:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:25:15 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:25:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:25:16 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:16 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:21 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:26 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:31 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:35 - OpenVPN > NETSH: command failed. 2016.01.29 17:25:35 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:25:35 - Disconnecting. 2016.01.29 17:25:35 - Connection terminated.I 2016.01.29 17:25:38 - Checking authorization ...! 2016.01.29 17:25:38 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:25:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:25:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:25:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:25:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:25:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:25:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:25:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:25:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1425f6cb 7a34d055. 2016.01.29 17:25:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:25:39 - OpenVPN > Validating certificate key usage. 2016.01.29 17:25:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:25:39 - OpenVPN > VERIFY KU OK. 2016.01.29 17:25:39 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:25:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:25:39 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:25:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:25:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:25:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:25:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:25:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:25:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:25:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:25:45 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:25:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:25:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:46 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:02 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:06 - OpenVPN > NETSH: command failed. 2016.01.29 17:26:06 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:26:06 - Disconnecting. 2016.01.29 17:26:06 - Connection terminated.I 2016.01.29 17:26:09 - Checking authorization ...! 2016.01.29 17:26:09 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:26:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:26:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:26:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:26:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:26:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:09 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:26:09 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:26:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:26:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=f00b1532 28006010. 2016.01.29 17:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:26:10 - OpenVPN > Validating certificate key usage. 2016.01.29 17:26:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:26:10 - OpenVPN > VERIFY KU OK. 2016.01.29 17:26:10 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:26:10 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:26:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:26:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:26:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:26:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:26:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:26:13 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:26:13 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:26:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:26:14 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:14 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:19 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:24 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:34 - OpenVPN > NETSH: command failed. 2016.01.29 17:26:34 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:26:34 - Disconnecting. 2016.01.29 17:26:34 - Connection terminated.I 2016.01.29 17:26:37 - Checking authorization ...! 2016.01.29 17:26:37 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:26:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:26:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:26:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:26:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:26:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:26:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:26:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:26:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=b766cf19 500a6a91. 2016.01.29 17:26:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:26:38 - OpenVPN > Validating certificate key usage. 2016.01.29 17:26:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:26:38 - OpenVPN > VERIFY KU OK. 2016.01.29 17:26:38 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:26:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:26:38 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:26:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:26:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:26:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:26:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:26:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:26:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:26:41 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:26:41 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:26:41 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:26:42 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:43 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:48 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:48 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:53 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:53 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:58 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:02 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:02 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:27:02 - Disconnecting. 2016.01.29 17:27:02 - Connection terminated.I 2016.01.29 17:27:06 - Checking authorization ...! 2016.01.29 17:27:06 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:27:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:27:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:27:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:27:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:27:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:07 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:27:07 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:27:07 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:27:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=777ee322 97dd1667. 2016.01.29 17:27:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:27:07 - OpenVPN > Validating certificate key usage. 2016.01.29 17:27:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:27:07 - OpenVPN > VERIFY KU OK. 2016.01.29 17:27:07 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:27:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:27:07 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:27:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:27:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:27:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:27:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:27:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:27:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:27:10 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:27:10 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:27:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:27:11 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:11 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:16 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:17 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:22 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:22 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:27 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:31 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:31 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:27:31 - Disconnecting. 2016.01.29 17:27:31 - Connection terminated.I 2016.01.29 17:27:34 - Checking authorization ...! 2016.01.29 17:27:35 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:27:35 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:27:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:27:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:27:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:27:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:35 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:27:35 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:27:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:27:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=0ce3656d 80900d2e. 2016.01.29 17:27:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:27:35 - OpenVPN > Validating certificate key usage. 2016.01.29 17:27:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:27:35 - OpenVPN > VERIFY KU OK. 2016.01.29 17:27:35 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:27:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:27:35 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:27:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:27:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:27:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:27:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:27:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:27:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:27:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:27:39 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:27:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:27:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:40 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:45 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:45 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:50 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:55 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:55 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:59 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:59 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:28:00 - Disconnecting. 2016.01.29 17:28:00 - Connection terminated.I 2016.01.29 17:28:00 - Cancel requested.I 2016.01.29 17:28:00 - IPv6 restored.! 2016.01.29 17:28:00 - Session terminated.
  3. I was using AirVPN Client 2.9 without any problem, I upgraded to version 2.10.3 and now no server will connect. I am using debian jessie. This is the log for one try, but it can go on for ever, repeating the conection-disconection: ! 2015.09.03 11:35:27 - Activation of Network Lock - Linux IPTables I 2015.09.03 11:35:35 - Session starting. I 2015.09.03 11:35:36 - Checking authorization ... ! 2015.09.03 11:35:36 - Connecting to Gorgonea (Canada, Toronto, Ontario) . 2015.09.03 11:35:36 - OpenVPN > OpenVPN 2.3.4 i586-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Dec 1 2014 . 2015.09.03 11:35:36 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2015.09.03 11:35:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.09.03 11:35:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.09.03 11:35:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.09.03 11:35:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.09.03 11:35:36 - OpenVPN > Socket Buffers: R=[163840->262144] S=[163840->262144] . 2015.09.03 11:35:36 - OpenVPN > UDPv4 link local: [undef] . 2015.09.03 11:35:36 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.250:443 . 2015.09.03 11:35:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=29f0600c f7f4edf9 . 2015.09.03 11:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.09.03 11:35:45 - OpenVPN > Validating certificate key usage . 2015.09.03 11:35:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.09.03 11:35:45 - OpenVPN > VERIFY KU OK . 2015.09.03 11:35:45 - OpenVPN > Validating certificate extended key usage . 2015.09.03 11:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.09.03 11:35:45 - OpenVPN > VERIFY EKU OK . 2015.09.03 11:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.09.03 11:35:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.09.03 11:35:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.09.03 11:35:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.09.03 11:35:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.09.03 11:35:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.09.03 11:35:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443 . 2015.09.03 11:35:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.09.03 11:35:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.19.120 255.255.0.0' . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2015.09.03 11:35:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.09.03 11:35:50 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlan0 HWADDR=00:1b:9e:fb:b9:a7 . 2015.09.03 11:35:50 - OpenVPN > TUN/TAP device tun0 opened . 2015.09.03 11:35:50 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.09.03 11:35:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.09.03 11:35:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.09.03 11:35:50 - OpenVPN > /sbin/ip addr add dev tun0 10.4.19.120/16 broadcast 10.4.255.255 . 2015.09.03 11:35:55 - OpenVPN > /sbin/ip route add 104.254.90.250/32 via 192.168.2.1 . 2015.09.03 11:35:55 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2015.09.03 11:35:55 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2015.09.03 11:35:55 - Starting Management Interface . 2015.09.03 11:35:55 - OpenVPN > Initialization Sequence Completed I 2015.09.03 11:35:55 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup I 2015.09.03 11:35:55 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) I 2015.09.03 11:35:55 - Flushing DNS I 2015.09.03 11:35:55 - Checking route W 2015.09.03 11:35:55 - Object reference not set to an instance of an object ! 2015.09.03 11:35:55 - Disconnecting . 2015.09.03 11:35:55 - Management - Send 'signal SIGTERM' . 2015.09.03 11:35:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.09.03 11:35:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.09.03 11:35:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.09.03 11:36:00 - OpenVPN > /sbin/ip route del 104.254.90.250/32 . 2015.09.03 11:36:00 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.09.03 11:36:00 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.09.03 11:36:00 - OpenVPN > Closing TUN/TAP interface . 2015.09.03 11:36:00 - OpenVPN > /sbin/ip addr del dev tun0 10.4.19.120/16 . 2015.09.03 11:36:00 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.09.03 11:36:00 - Connection terminated. I 2015.09.03 11:36:00 - DNS of the system restored to original settings (Rename method) I 2015.09.03 11:36:02 - Cancel requested. ! 2015.09.03 11:36:02 - Session terminated. ! 2015.09.03 11:38:29 - Deactivation of Network Lock any help apreciated acacia
  4. Mon Sep 16 23:06:33 2013 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_Singapore_TCP-443.log: Access is denied. (errno=5) Mon Sep 16 23:06:33 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013 Mon Sep 16 23:06:33 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Mon Sep 16 23:06:33 2013 Need hold release from management interface, waiting... Mon Sep 16 23:06:33 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'state on' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'log all on' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'hold off' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'hold release' Mon Sep 16 23:06:33 2013 Socket Buffers: R=[8192->8192] S=[8192->8192] Mon Sep 16 23:06:33 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 Mon Sep 16 23:06:33 2013 MANAGEMENT: >STATE:1379369193,TCP_CONNECT,,, Mon Sep 16 23:06:34 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Mon Sep 16 23:06:39 2013 MANAGEMENT: >STATE:1379369199,TCP_CONNECT,,, Mon Sep 16 23:06:40 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Mon Sep 16 23:06:45 2013 MANAGEMENT: >STATE:1379369205,TCP_CONNECT,,, Mon Sep 16 23:06:46 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Why is this not working?
×
×
  • Create New...