Search the Community
Showing results for tags 'obfuscation'.
Found 3 results
-
I just signed up for a year plan of AirVPN and gave Eddie a try. It isn't able to connect to AirVPN servers for me. And in the protocols tab of Eddie settings — all I found were just a bunch of OpenVPN ports and a few WireGuard ones. I don't need to say ports aren't protocols. I knew AmneziaWG client would work with AirVPN, but was hoping I could find use for Eddie, especially if split-tunnel routing could be set up more intelligently than the barebones AmneziaWG offers in that department. To give you an idea of routing hoops I was trying to avoid jumping: I'm having to use a self-written script for automatic CIDR-set inversion and input the result into the configs manually… it's a whole chore. I'm able to connect to AirVPN WireGuard servers using AmneziaWG client by manually enriching the configs generated with the `i1` parameter set to a binary string I had to find myself — one that slips under the DPI radar. Here's a page about AmneziaVPN, but which illustrates how a suitable binary string may be acquired: https://docs.amnezia.org/documentation/instructions/new-amneziawg-selfhosted/ I'm in Russia on Windows and Android. A poweruser and a coder where it comes to PC. Know my way around GNU/Linux and WSL when needed too. AmneziaWG 1.5 protocol extends WireGuard with CPS among other client-side obfuscation methods and presents a necessary technique of VPN connection restriction circumvention in Russia. Basic feature documentation here: https://docs.amnezia.org/documentation/amnezia-wg/#how-it-works CPS is fully compatible with any ol' WireGuard server due to inherent noise filtering WG is built on and basically only concerns establishment of a persistent connection. The DPI systems deployed over here are only capable of interrogating and filtering traffic of establishing connections to decide whether the outbound port opening by ISP will be permitted. My ISP already won't let connections to WireGuard endpoints that are performed without CPS and I'm sure many other ISPs block them as well, judging by rapid CPS adoption observed being reported on Russian Internet censorship circumvention forums. Used to be that `j` parameters would be enough to get around DPI packet filtering. Now pretty much nothing aside the `i` parameter helps in AmneziaWG client. To be clear before I proceed, I'd like to call attention to the following all being distinct entities not to be confused with each other, despite overlapping titling convention: - AmneziaWG protocol extending WireGuard protocol mainly to inject junk that bedazzles active DPI systems in the middle. This is the topic here. - AmneziaWG software forked openly from WireGuard client sources, implementing the above with its own version numbers not shared with the upstream or either protocols. - AmneziaVPN service hosted commercially. - AmneziaVPN software sorta implementing both but mainly geared as a client to the service. Now here's the pickle… Technical protocol specification documentation for AmneziaWG 1.5, including CPS is somewhat scant. No committee, just scrambling for the arms race. It's probably better to check reference implementations. IIRC, this commit implements `i#` parameters, where `#` is a digit: https://github.com/amnezia-vpn/amneziawg-go/commit/c20789848019fb494dbe9d280eb246f29b95ab85 WG Tunnel is an independent FOSS Android implementation of AmneziaWG 1.5 CPS in a config-compatible manner to AmneziaWG client: https://github.com/wgtunnel/wgtunnel I'm also aware of another implementation in a commercial WireGuard client titled WireSock Secure Connect Beta that derives those binaries procedurally, which makes it not directly config-compatible, but that is off topic at the moment. With everything above in mind, it does not seem like Eddie is going to be usable in Russia until AmneziaWG 1.5 CPS is implemented. So here's me asking if Eddie could support AmneziaWG 1.5 CPS client extension to the WireGuard protocol. And to be thorough in avoiding confusion, in case my initial statement is lost in the post, I want to repeat… No modifications is needed to AirVPN's WireGuard servers in order to implement this — CPS is client-side handshake obfuscation that WireGuard's built-in noise filtering inherently ignores.
-
Hi, Wireguard is easy to detect and can be easily blocked. Does somebody know what happens with UDP packets (for example if doing Teams calls)? How will they be forwared when using OpenVPN in TCP mode? Will the packets simply bypass the VPN and be routed directly?
-
I am on the new Eddie beta and i cannot connect via Tor when it is using a obfs bridge. The error reads that it cannot identify the first node in the established circuit. Is this a bug or does AirVPN only work over non obfuscated tor? Log is bellow I 2016.11.20 16:16:06 - Eddie client version: 2.11.7 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0. 2016.11.20 16:16:06 - Reading options from C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\AirVPN.xml. 2016.11.20 16:16:06 - Data Path: C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN. 2016.11.20 16:16:06 - App Path: C:\Program Files\AirVPN. 2016.11.20 16:16:06 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.11.20 16:16:06 - Command line arguments (1): path="home". 2016.11.20 16:16:06 - Operating System: Microsoft Windows NT 10.0.14393.0I 2016.11.20 16:16:06 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.11.20 16:16:06 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)I 2016.11.20 16:16:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2016.11.20 16:16:06 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)! 2016.11.20 16:16:06 - Activation of Network Lock - Windows Filtering Platform! 2016.11.20 16:16:07 - Ready. 2016.11.20 16:16:07 - Updating systems & servers data ...I 2016.11.20 16:16:17 - Session starting.. 2016.11.20 16:16:17 - IPv6 disabled with packet filtering.I 2016.11.20 16:16:17 - Checking authorization .... 2016.11.20 16:17:03 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (curl: (7) Failed to receive SOCKS4 connect request ack., with 'socks' proxy and 'none' auth)W 2016.11.20 16:17:03 - Authorization check failed, continue anyway ({1])I 2016.11.20 16:17:03 - Cancel requested.. 2016.11.20 16:17:03 - IPv6 restored with packet filtering.! 2016.11.20 16:17:03 - Session terminated.! 2016.11.20 16:17:07 - Deactivation of Network LockI 2016.11.20 16:17:42 - Session starting.. 2016.11.20 16:17:42 - IPv6 disabled with packet filtering.I 2016.11.20 16:17:42 - Checking authorization ...! 2016.11.20 16:17:43 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:17:43 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:17:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:17:43 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:17:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:17:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:17:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2016.11.20 16:17:43 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9150, sid=a30f1ab4 4d335e9d. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:17:46 - OpenVPN > Validating certificate key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:17:46 - OpenVPN > VERIFY KU OK. 2016.11.20 16:17:46 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:17:46 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:17:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:17:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:17:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:17:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:17:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:17:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:17:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:17:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:17:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:17:50 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:17:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - Starting Management Interface. 2016.11.20 16:17:55 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:17:55 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:17:55 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:17:55 - Flushing DNS! 2016.11.20 16:17:55 - Connected.. 2016.11.20 16:17:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:18:14 - OpenVPN > Connection reset, restarting [0]. 2016.11.20 16:18:14 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.11.20 16:18:14 - OpenVPN > Restart pause, 5 second(s)! 2016.11.20 16:18:15 - Disconnecting. 2016.11.20 16:18:15 - Management - Send 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: Client disconnected. 2016.11.20 16:18:15 - OpenVPN > Assertion failed at misc.c:785 (es). 2016.11.20 16:18:15 - OpenVPN > Exiting due to fatal error. 2016.11.20 16:18:15 - Connection terminated.. 2016.11.20 16:18:15 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:18:15 - DNS leak protection with packet filtering disabled.I 2016.11.20 16:18:18 - Checking authorization .... 2016.11.20 16:18:39 - IPv6 restored with packet filtering.! 2016.11.20 16:18:39 - Session terminated.. 2016.11.20 16:18:43 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:18:43 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:18:58 - Session starting.. 2016.11.20 16:18:58 - IPv6 disabled with packet filtering.I 2016.11.20 16:18:58 - Checking authorization .... 2016.11.20 16:18:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:18:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:02 - Checking authorization .... 2016.11.20 16:19:03 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:03 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:06 - Checking authorization .... 2016.11.20 16:19:06 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:06 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:09 - Checking authorization .... 2016.11.20 16:19:10 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:10 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:13 - Checking authorization .... 2016.11.20 16:19:13 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:13 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:16 - Checking authorization .... 2016.11.20 16:19:17 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:17 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:20 - Checking authorization .... 2016.11.20 16:19:20 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:20 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:23 - Checking authorization .... 2016.11.20 16:19:24 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:24 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:27 - Checking authorization .... 2016.11.20 16:19:27 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:27 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:30 - Checking authorization .... 2016.11.20 16:19:31 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:31 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:34 - Checking authorization .... 2016.11.20 16:19:34 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:34 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:37 - Checking authorization .... 2016.11.20 16:19:38 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:38 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:41 - Checking authorization .... 2016.11.20 16:19:41 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:41 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:44 - Checking authorization .... 2016.11.20 16:19:45 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:45 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:48 - Checking authorization .... 2016.11.20 16:19:48 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:48 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:51 - Checking authorization .... 2016.11.20 16:19:52 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:52 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:55 - Checking authorization .... 2016.11.20 16:19:55 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:55 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:58 - Checking authorization .... 2016.11.20 16:19:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:02 - Checking authorization .... 2016.11.20 16:20:02 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:20:02 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:03 - Cancel requested.. 2016.11.20 16:20:03 - IPv6 restored with packet filtering.! 2016.11.20 16:20:03 - Session terminated.. 2016.11.20 16:20:28 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:20:28 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:20:40 - Session starting.. 2016.11.20 16:20:40 - IPv6 disabled with packet filtering.I 2016.11.20 16:20:40 - Checking authorization ...! 2016.11.20 16:20:40 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\feeb3a551e3656516314ff5af4689220b56f5540714f87b565aef88dc503e290.tmp.ssl. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Configuration successful. 2016.11.20 16:20:40 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:20:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:20:40 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:20:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:20:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:20:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:10223 [nonblock]. 2016.11.20 16:20:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58110. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58111. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Peer certificate required. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Client certificate not requested. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:10223, sid=68003b72 94079eda. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - OpenVPN > Validating certificate key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:20:41 - OpenVPN > VERIFY KU OK. 2016.11.20 16:20:41 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:20:41 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:20:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:20:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:20:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:20:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:20:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:20:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:20:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:20:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:20:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:20:45 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:20:50 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:20:50 - Starting Management Interface. 2016.11.20 16:20:50 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:20:50 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:20:50 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:20:51 - Flushing DNSI 2016.11.20 16:20:51 - Checking routeI 2016.11.20 16:20:52 - Checking DNS! 2016.11.20 16:20:53 - Connected.. 2016.11.20 16:20:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.11.20 16:21:02 - Disconnecting. 2016.11.20 16:21:02 - Management - Send 'signal SIGTERM'. 2016.11.20 16:21:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG5[0]: Connection reset: 14246 byte(s) sent to SSL, 31054 byte(s) sent to socket. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:21:02 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:21:02 - Connection terminated.. 2016.11.20 16:21:02 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:21:02 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:21:02 - IPv6 restored with packet filtering.! 2016.11.20 16:21:03 - Session terminated.! 2016.11.20 16:21:05 - Activation of Network Lock - Windows Filtering PlatformI 2016.11.20 16:21:06 - Session starting.. 2016.11.20 16:21:07 - IPv6 disabled with packet filtering.I 2016.11.20 16:21:07 - Checking authorization ...! 2016.11.20 16:21:07 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\22d74ef001e6d4cdf488445fd0769db55489cc4aa318894a4790d18cf7b03661.tmp.ssl. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Configuration successful. 2016.11.20 16:21:07 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:21:07 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:21:07 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58156. 2016.11.20 16:21:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58247 [nonblock]. 2016.11.20 16:21:07 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58157. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Peer certificate required. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Client certificate not requested. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:21:08 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58247, sid=640a5d20 072a4038. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - OpenVPN > Validating certificate key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:21:08 - OpenVPN > VERIFY KU OK. 2016.11.20 16:21:08 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:21:08 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:21:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:21:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:21:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:21:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:21:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:21:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:21:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:21:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:21:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:21:11 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:21:16 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - Starting Management Interface. 2016.11.20 16:21:17 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:21:17 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:21:17 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:21:17 - Flushing DNSI 2016.11.20 16:21:17 - Checking routeI 2016.11.20 16:21:18 - Checking DNS! 2016.11.20 16:21:18 - Connected.. 2016.11.20 16:21:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Executing cron jobs. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Cron jobs completed in 0 seconds! 2016.11.20 16:22:39 - Disconnecting. 2016.11.20 16:22:39 - Management - Send 'signal SIGTERM'. 2016.11.20 16:22:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG5[0]: Connection reset: 118849 byte(s) sent to SSL, 691040 byte(s) sent to socket. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:22:39 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:22:39 - Connection terminated.. 2016.11.20 16:22:40 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:22:40 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:22:40 - IPv6 restored with packet filtering.! 2016.11.20 16:22:40 - Session terminated.! 2016.11.20 16:22:41 - Deactivation of Network Lock. 2016.11.20 16:23:02 - Tor Test: Unable to communicate with Tor (Unable to find your Tor path.). Is Tor up and running?I 2016.11.20 16:23:29 - Session starting.. 2016.11.20 16:23:29 - IPv6 disabled with packet filtering.I 2016.11.20 16:23:29 - Checking authorization .... 2016.11.20 16:23:29 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:29 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:32 - Checking authorization .... 2016.11.20 16:23:33 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:33 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:36 - Checking authorization .... 2016.11.20 16:23:37 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:37 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:40 - Checking authorization .... 2016.11.20 16:23:40 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:40 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:42 - Cancel requested.. 2016.11.20 16:23:42 - IPv6 restored with packet filtering.! 2016.11.20 16:23:42 - Session terminated.
