Jump to content
Not connected, Your IP: 18.207.238.169

Search the Community

Showing results for tags 'support'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 12 results

  1. Hello: eddie connects but then i have no internet access. have tried multiple canadian servers. logs below. any support would be appreciated, thank you. Eddie System/Environment Report - 6/10/2018 8:08 PM UTC Eddie version: 2.14.5Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.17134.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\j&a\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\Eddie-UI.exeCommand line arguments: (1 args) path="home"Network Lock Active: Yes, Windows Filtering PlatformConnected to VPN: Yes, LesathDetected DNS: 10.0.0.1, 10.4.0.1, 2001:4e8:0:4007::15, 2001:4e8:0:4009::11Test DNS IPv4: OkTest DNS IPv6: FailedTest Ping IPv4: 80 msTest Ping IPv6: -1 msTest HTTP IPv4: OkTest HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.websiteTest HTTPS: Ok----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: True ----------------------------Logs: . 2018.06.10 12:45:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.06.10 12:45:17 - Reading options from C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml. 2018.06.10 12:45:17 - Profile options not found, using defaults.. 2018.06.10 12:45:17 - Command line arguments (1): path="home". 2018.06.10 12:45:18 - Cannot find tunnel adapter.E 2018.06.10 12:45:19 - OpenVPN Driver - Not available - Will be installed at next connection.. 2018.06.10 12:45:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.06.10 12:45:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.06.10 12:45:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.06.10 12:45:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.06.10 12:45:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2018.06.10 12:45:20 - Updating systems & servers data ...I 2018.06.10 12:45:20 - Ready. 2018.06.10 12:45:21 - Systems & servers data update completedI 2018.06.10 12:46:04 - Checking login ...! 2018.06.10 12:46:05 - Logged in.! 2018.06.10 12:46:14 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 12:46:18 - Session starting.. 2018.06.10 12:46:18 - Cannot find tunnel adapter.! 2018.06.10 12:46:18 - Installing tunnel driverI 2018.06.10 12:46:22 - Checking authorization .... 2018.06.10 12:46:22 - IPv6 disabled with packet filtering.! 2018.06.10 12:46:22 - Connecting to Gorgonea (Canada, Toronto, Ontario). 2018.06.10 12:46:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:46:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:46:23 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:46:23 - Connection to OpenVPN Management Interface. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:46:23 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:46:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=01bc53b3 755548eb. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > VERIFY KU OK. 2018.06.10 12:46:23 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:46:23 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:46:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443. 2018.06.10 12:46:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.115 255.255.0.0,peer-id 26,cipher AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 12:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:46:24 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:46:24 - OpenVPN > open_tun. 2018.06.10 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.115/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.115/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:46:24 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:46:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:46:29 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:46:29 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:46:29 - Routes, added a new route, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:46:29 - Flushing DNSI 2018.06.10 12:46:32 - Checking route IPv4I 2018.06.10 12:46:33 - Checking DNS! 2018.06.10 12:46:45 - Connected.. 2018.06.10 12:46:45 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:46:45 - OpenVpn Management > ENTER PASSWORD:! 2018.06.10 12:47:31 - Disconnecting. 2018.06.10 12:47:31 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:47:31 - Sending management termination signal. 2018.06.10 12:47:31 - Management - Send 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 12:47:36 - OpenVPN > TAP: DHCP address released. 2018.06.10 12:47:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 12:47:36 - Connection terminated.. 2018.06.10 12:47:36 - IPv6 restored with packet filtering.. 2018.06.10 12:47:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 12:47:36 - DNS leak protection with packet filtering disabled.. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 12:47:36 - Flushing DNS! 2018.06.10 12:47:39 - Session terminated.! 2018.06.10 12:47:40 - Deactivation of Network LockI 2018.06.10 12:49:02 - Session starting.I 2018.06.10 12:49:02 - Checking authorization .... 2018.06.10 12:49:02 - IPv6 disabled with packet filtering.! 2018.06.10 12:49:02 - Connecting to Alwaid (Canada, Toronto, Ontario). 2018.06.10 12:49:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:49:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:49:03 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:49:03 - Connection to OpenVPN Management Interface. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:49:03 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:49:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=820316e9 17d858a1. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:49:03 - OpenVPN > VERIFY KU OK. 2018.06.10 12:49:03 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:49:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:49:03 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:49:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:49:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443. 2018.06.10 12:49:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:49:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.174 255.255.0.0'. 2018.06.10 12:49:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:49:07 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:49:07 - OpenVPN > open_tun. 2018.06.10 12:49:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:49:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:49:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.174/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:49:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.174/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:49:07 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:49:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:49:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:49:12 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:49:12 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:49:12 - Routes, added a new route, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 12:49:12 - Flushing DNSI 2018.06.10 12:49:16 - Checking route IPv4I 2018.06.10 12:49:16 - Checking DNS! 2018.06.10 12:49:29 - Connected.. 2018.06.10 12:49:29 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:49:29 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 12:56:00 - Updating systems & servers data .... 2018.06.10 12:56:01 - Systems & servers data update completed. 2018.06.10 12:57:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #68630 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2018.06.10 13:00:59 - Above log line repeated 19 times more! 2018.06.10 13:00:59 - Disconnecting. 2018.06.10 13:00:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 13:00:59 - Sending management termination signal. 2018.06.10 13:00:59 - Management - Send 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:01:04 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:01:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:01:04 - Connection terminated.. 2018.06.10 13:01:04 - IPv6 restored with packet filtering.. 2018.06.10 13:01:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:01:04 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 13:01:04 - Flushing DNS! 2018.06.10 13:01:07 - Session terminated.! 2018.06.10 13:01:09 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 13:01:18 - Session starting.I 2018.06.10 13:01:18 - Checking authorization .... 2018.06.10 13:01:18 - IPv6 disabled with packet filtering.! 2018.06.10 13:01:18 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.06.10 13:01:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:01:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:01:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:01:19 - Connection to OpenVPN Management Interface. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:01:19 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:01:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=047e9ced e53fae6b. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > VERIFY KU OK. 2018.06.10 13:01:19 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:01:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:01:19 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:01:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.06.10 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:01:25 - Above log line repeated 1 times more. 2018.06.10 13:01:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.48 255.255.0.0'. 2018.06.10 13:01:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:01:25 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:01:25 - OpenVPN > open_tun. 2018.06.10 13:01:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:01:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:01:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.48/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:01:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.48/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:01:25 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:01:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:01:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:01:31 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:01:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:01:31 - Routes, added a new route, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:01:31 - Flushing DNSI 2018.06.10 13:01:34 - Checking route IPv4I 2018.06.10 13:01:35 - Checking DNS! 2018.06.10 13:01:47 - Connected.. 2018.06.10 13:01:47 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:01:47 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 13:06:36 - Updating systems & servers data .... 2018.06.10 13:06:38 - Systems & servers data update completed! 2018.06.10 13:06:56 - Disconnecting. 2018.06.10 13:06:56 - Routes, removed a route previously added, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:06:56 - Sending management termination signal. 2018.06.10 13:06:56 - Management - Send 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:07:01 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:07:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:07:01 - Connection terminated.. 2018.06.10 13:07:01 - IPv6 restored with packet filtering.. 2018.06.10 13:07:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:07:01 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.06.10 13:07:01 - Checking authorization .... 2018.06.10 13:07:02 - IPv6 disabled with packet filtering.! 2018.06.10 13:07:02 - Connecting to Lesath (Canada, Toronto, Ontario). 2018.06.10 13:07:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:07:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:07:02 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:07:02 - Connection to OpenVPN Management Interface. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:07:02 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:07:02 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=3f473ba1 678b1534. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > VERIFY KU OK. 2018.06.10 13:07:02 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:07:02 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:07:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443. 2018.06.10 13:07:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:07:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.129 255.255.0.0,peer-id 35,cipher AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 13:07:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:07:03 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:07:03 - OpenVPN > open_tun. 2018.06.10 13:07:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:07:03 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:07:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.129/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:07:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.129/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:07:03 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:07:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:07:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.2 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:07:09 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:07:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:07:09 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1. 2018.06.10 13:07:09 - Flushing DNSI 2018.06.10 13:07:12 - Checking route IPv4I 2018.06.10 13:07:13 - Checking DNS! 2018.06.10 13:07:25 - Connected.. 2018.06.10 13:07:25 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:07:25 - OpenVpn Management > ENTER PASSWORD: ----------------------------Network Interfaces and Routes: {"support_ipv4": true,"support_ipv6": true,"routes": [{"address": "0.0.0.0\/0","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "0.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "10.0.0.0\/24","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.28","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.4.0.0\/16","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.12.129","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "127.0.0.0\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.0.0.1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "128.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "184.75.221.2","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "184.75.221.3","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "4"},{"address": "224.0.0.0\/4","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "224.0.0.0\/4","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "224.0.0.0\/4","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "255.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "255.255.255.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "255.255.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "::1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "2604:3d08:807f:fff2::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2::4b9b","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:6068:eaf3:7657:beff","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "fe80::d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::1923:642e:f94e:9d84","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "ff00::\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "ff00::\/8","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "ff00::\/8","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"}],"interfaces": [{"friendly": "Ethernet 2","id": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","name": "Ethernet 2","description": "TAP-Windows Adapter V9","type": "Ethernet","status": "Up","bytes_received": "187651520","bytes_sent": "8967995","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1923:642e:f94e:9d84","10.4.12.129"],"gateways": ["10.4.0.1"],"bind": true,"dns4": "10.4.0.1","dns6": ""},{"friendly": "Ethernet","id": "{3734B147-25DA-4BF8-A5D2-DC0198F2AEDE}","name": "Ethernet","description": "Intel® Ethernet Connection (2) I219-V","type": "Ethernet","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::9af:cbb8:5bf6:daf5","169.254.218.245"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 1","id": "{CDE07587-CBC4-4511-98F0-1DE08E03741B}","name": "Local Area Connection* 1","description": "Microsoft Wi-Fi Direct Virtual Adapter","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1826:7eb5:c160:2961","169.254.41.97"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 2","id": "{5D425C74-E6CB-4C46-B97E-37E055CB402F}","name": "Local Area Connection* 2","description": "Microsoft Wi-Fi Direct Virtual Adapter #2","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::6cce:906e:581f:8776","169.254.135.118"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Wi-Fi","id": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","name": "Wi-Fi","description": "D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter","type": "Wireless80211","status": "Up","bytes_received": "1266311438","bytes_sent": "38479803","support_ipv4": true,"support_ipv6": true,"ips": ["2604:3d08:807f:fff2::4b9b","2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","2604:3d08:807f:fff2:6068:eaf3:7657:beff","fe80::d9a:651b:8f8c:3d75","10.0.0.28"],"gateways": ["10.0.0.1"],"bind": true,"dns4": "","dns6": ""},{"friendly": "Loopback Pseudo-Interface 1","id": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","name": "Loopback Pseudo-Interface 1","description": "Software Loopback Interface 1","type": "Loopback","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["::1","127.0.0.1"],"gateways": [],"bind": true,"dns4": "","dns6": null}],"ipv4-default-gateway": "10.4.0.1","ipv4-default-interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}"}----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-UP0BGVO Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : vc.shawcable.net Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-F8-AA-B3-0B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::1923:642e:f94e:9d84%40(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.12.129(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 1:07:03 PM Lease Expires . . . . . . . . . . : Monday, June 10, 2019 1:07:03 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 671154168 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel® Ethernet Connection (2) I219-V Physical Address. . . . . . . . . : 40--5C-E5-42-9D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 7A-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : vc.shawcable.net Description . . . . . . . . . . . : D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2::4b9b(Preferred) Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:40 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:31:47 AM IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2:d9a:651b:8f8c:3d75(Deprecated) Temporary IPv6 Address. . . . . . : 2604:3d08:807f:fff2:6068:eaf3:7657:beff(Deprecated) Link-local IPv6 Address . . . . . : fe80::d9a:651b:8f8c:3d75%17(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.28(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:35 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:52:35 AM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 158872091 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 2001:4e8:0:4009::11 2001:4e8:0:4007::15 10.0.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled
  2. ​​Hi guys, what I like is the speed, an interface on Windows although I use Linux much more. Ok, what I would like to see is in AIRVPN News or RSS-subscription or email warning, the latest security risks. I use AIRVPN for a while now butjust this week it turns out that there is a IPv6 leak!! Although not visible when testing it on ipleak.net. That means that I was very visible on a lot of networks and not anonymous at all!! I try to be very carefull, not for criminal reasons, more as a principle, a way of living so to say. So, that was a major dissapointment in AirVPN. Because I´m not a technician but amateur user. As soon as I found out I did a little research and it turns out that you can disable IPv6. What I did was follw the instructions [cut, no ads, Staff] That worked as a charm and the site that was able to track me, now shows the AIRVPN route as it should. So people, be advised.....disable IPv6 as long as there is no other solution offered. As ​stated before, I´m just a simple user and chose AIVPN to be protected by professionals. Although I´m very satisfied overall, I´m worried about the next hole or leak that I´m not aware off. So, people of AIRVPN, please keep us pro-actively informed about security and privacy issues if you please. Sincere, Peer ​ ​
  3. Few swiss websites are already supported by those double-hop server routing feature, so I like to ask if you can add that swiss television streaming service www.teleboy.ch as well ?
  4. Hello, I'm using "OpenVPN Settings" on Android, because of an unfixed bug of Android which completely prevents me from using OpenVPN for Android. So I am sorry that I cannot use the recommended app. I created an "Android" config file in the client area, but my first problem is that "/sbin/ip" was not found: iproute was at "/system/bin/ip" instead. I figured out that adding `iproute /system/bin/ip` to my ovpn config file fixed this. Now the openvpn successfully connects either from terminal using `openvpn <filename.ovpn` or using OpenVPN Settings app. But, my browser is still going straight to the web from my mobile network. My IP address is still my normal IP address when I look it up, though OpenVPN logs appear normal and successfully connected. I have tried adding 'redirect-gateway' to the config file but it doesn't work. I would love some support making this connection successful and secure as I would like to use my phone through VPN only for some tasks. I have attached my logs. Thanks!
  5. The swedish airvpn servers have 650% worse latency to the servers, and equally worse latency to the DNS responders if you compare the swedish servers with all the servers in Holland. This has been going on for over a year, and this problem also affects the brand new airvpn servers in sweden. This is unacceptable.
  6. What is the feasibility of adding the server's status (online, offline, imminent withdrawal, etc.) as a new Attribute name in an XML formatted API call? This would be very helpful for those of us wishing to rank servers and then select one for connection via openvpn. Thank you.
  7. What is the feasibility of adding the server's IP address as a new Attribute name in an XML formatted API call? This would be very helpful for those of us wishing to rank servers and then select one for connection via openvpn. Thank you.
  8. Hello, i just opened now a IRC Channel #AirVPN on the irc network irc.freenode.org this channel can be usefull for new users to get in touch with AirVPN services and just to talk about Anonimyzers in general. if any administrator of AirVPN want to come, i will be glad to offer them the Operator status. i hope that you will like it & have a nice day.
  9. Hi, I made a trial request, how long will it be till its accepted, or can it be accepted here?
  10. [spam deleted] INFACT my support ticket hasnt been responded to. [spam deleted]
  11. Hello, I think Air should add GPG support for the Contact Us page ( regardless of whether one has registered and logged in as a client or is accessing as guest). Users could upload their GPG public key so Air's responses sent via e-mail to the user would be encrypted. This would really improve security, particularly for users who have an insecure mail host. Best regards, anonym
  12. Hi. I can't access the support ticket I created with you. It's suddenly showing me that either email or password is wrong but both was fine before! Also after register on your website I got a white site after submitting my registration details. Maybe you should check that.
×
×
  • Create New...