Jump to content
Not connected, Your IP: 18.207.238.169

Search the Community

Showing results for tags 'windows 10'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 49 results

  1. suddenly when i start up airvpn client in windows 10 i do not see the login page, but the tray icon dissapears, it is like the main window is 'off screen'. (taskbar appears as well as working tray icon through which i can connect. anybody else has these problems, thanksq
  2. I have been using Open VPN for a few years now but today it refuses to open in Windows 10. Eddie is apparently running, holds the computer open when trying to restart. If I try and run again it states that it is already running. I have tried remove and reinstall but get the same result. Any thoughts/suggestions would be appreciated.
  3. Hi, Recently, I am experiencing long waiting times (20+ mins) for Eddie to start up and run in Windows 10. Apparently, the program tries to "delete routes", trying - without success - to do the same thing over and over again. Here is what happens: Eddie version: 2.16.3Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 ProOS version: Microsoft Windows NT 10.0.17134.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Program Files\AirVPN\default.xmlData path: C:\Program Files\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\Eddie-UI.exeCommand line arguments: (0 args) Network Lock Active: Yes, Windows Filtering PlatformConnected to VPN: Yes, SpicaDetected DNS: 10.30.172.1, 181.213.132.2, 181.213.132.3, 2804:14d:1:0:181:213:132:2, 2804:14d:1:0:181:213:132:3, fde6:7a:7d20:1aac::1Test DNS IPv4: OkTest DNS IPv6: OkTest Ping IPv4: 170 msTest Ping IPv6: 156 msTest HTTP IPv4: OkTest HTTP IPv6: OkTest HTTPS: Ok----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Truenetlock: Trueservers.whitelist: 04c8003cc011ead147020baa01cb5301b409a49bddea1291127c67e1b156b6ce,7dce595b16ae39e6d37cf81b100e008651fbaaaf237caebbfa77842c33c816ec,2c99a52815c8fe1d14379c250894e5375c20742afe6092eb26e297261ca46146,3b1730f6ce5e57fba3f83c064992bacd521e409a3d4bf84de3b2e1becf0c953e,3e476d0dbfee71775c28855154a0946698afcfdc24c6c624a7be9d52864d2a24,a86c97a9b8fbbd4fa64734cd34a0dbde94cb28b8e32ad9312b090fa88f0ad002,13f7192498028afd153ba517b2308f5d502117879cab3d6e65eadf22da0191b4,ee007e611ec83d4639229dcdea940c28355e4e069636fe7afe155638abd41d42,03aa4890d313517d56d3c9e60762bee0ddf4ba331e84f2895672dc4d00843985,5102c436d182218aeac230b411f7d39b995225e63afa82627c6d8033315d4462,19b5c7333f2cce1a07c093e556c7fa68af4cea13237d528fd9100c6190250112,f5d73829120274d7788690ad00fe8b8c715254226b85f65f06691c061a6517a6,937673889b0f5310ff05026b4fb16cf6397fe799748ef9dcd48da67bccb534b9,d69a9d9dc0d43b63b3e64d816ee7029a4da743426f7d6f9f8221e84c6155721f,600bb65180381071c7d4e7e6f472233b6d0caeaabddf5ca2690a978fb59111dc,82ac7c8f54a8ad422dbfe877207bc7d308e651e611a37523238584b83693b55e,db34d07034f09d8832eb33595a9813167aee65dabdbfa9d67b439f937babc332,f574bc585b9667eb5d34187ee9a5e92f827aff8b47dd7279f867e37079657b4c,49048b88453921e46768bb49a049e9cc2dc8cac6451a53db5261fd2aebf92366,4a753c464da67849afcf7be670e0300c9239e1811d07e03d5caa7f4804e5d104,3858a066dafe1ecd6f5e898755e88ab035aa6ba80664cdc19c18c1465fae95c6,b13669ff16ae7e6153750034ca95edcca78da0983ff27e11b8b3e8b2989db680ui.skip.provider.manifest.failed: True ----------------------------Logs: . 2018.11.25 10:52:34 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.11.25 10:52:35 - Reading options from C:\Program Files\AirVPN\default.xml. 2018.11.25 10:52:44 - Command line arguments (0):. 2018.11.25 10:52:44 - Profile path: C:\Program Files\AirVPN\default.xml. 2018.11.25 10:53:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.11.25 10:53:40 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.11.25 10:53:40 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.11.25 10:53:41 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.11.25 10:53:41 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.11.25 10:53:41 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pemW 2018.11.25 10:53:49 - Recovery. Unexpected crash?. 2018.11.25 10:54:07 - Routes, remove 91.207.57.115 for gateway 10.6.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:54:45 - Above log line repeated 3 times more. 2018.11.25 10:54:45 - Routes, remove 184.75.221.59 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:54:55 - Routes, remove 184.75.223.235 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:05 - Routes, remove 91.207.57.115 for gateway 10.12.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:14 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:43 - Above log line repeated 2 times more. 2018.11.25 10:55:43 - Routes, remove 213.152.161.117 for gateway 10.5.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:55:53 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:03 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:12 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:22 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:31 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:41 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:56:50 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:00 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:19 - Above log line repeated 1 times more. 2018.11.25 10:57:19 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:29 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:38 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:48 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:57:58 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:07 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:17 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:26 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:36 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:46 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:58:55 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:05 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:24 - Above log line repeated 1 times more. 2018.11.25 10:59:24 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:33 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:43 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 10:59:52 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:02 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:11 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:21 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:30 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:00:40 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:06 - Above log line repeated 2 times more. 2018.11.25 11:01:06 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:15 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:25 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:34 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:43 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:01:53 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:02 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:12 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:21 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:30 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:40 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:49 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:02:59 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:08 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:17 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:27 - Routes, remove 213.152.161.20 for gateway 10.29.4.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:36 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:46 - Routes, remove 199.19.94.16 for gateway 10.6.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:03:55 - Routes, remove 199.19.94.135 for gateway 10.27.196.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:04 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:14 - Routes, remove 184.75.214.163 for gateway 10.13.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:20 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:29 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:39 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:48 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:04:58 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:07 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:16 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:35 - Above log line repeated 1 times more. 2018.11.25 11:05:35 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:05:45 - Routes, remove 213.152.161.85 for gateway 10.19.228.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:03 - Above log line repeated 1 times more. 2018.11.25 11:06:03 - Routes, remove 162.219.176.3 for gateway 10.6.100.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:13 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:22 - Routes, remove 184.75.221.163 for gateway 10.9.36.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:32 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:41 - Routes, remove 104.254.90.203 for gateway 10.8.68.1 failed: The route deletion failed: Element not found. 2018.11.25 11:06:50 - Routes, remove 199.19.94.193 for gateway 10.30.164.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:00 - Routes, remove 199.19.94.135 for gateway 10.27.204.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:28 - Above log line repeated 2 times more. 2018.11.25 11:07:28 - Routes, remove 64.42.179.51 for gateway 10.23.140.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:37 - Routes, remove 199.19.94.135 for gateway 10.27.204.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:47 - Routes, remove 184.75.221.163 for gateway 10.9.44.1 failed: The route deletion failed: Element not found. 2018.11.25 11:07:56 - Routes, remove 184.75.214.163 for gateway 10.13.108.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:11 - Routes, remove 199.19.94.16 for gateway 10.6.236.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:21 - Routes, remove 162.219.176.3 for gateway 10.6.108.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:39 - Above log line repeated 1 times more. 2018.11.25 11:08:39 - Routes, remove 199.19.94.193 for gateway 10.30.172.1 failed: The route deletion failed: Element not found. 2018.11.25 11:08:46 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.6.100.1). 2018.11.25 11:08:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)! 2018.11.25 11:08:55 - Deactivation of Network Lock! 2018.11.25 11:08:55 - Activation of Network Lock - Windows Filtering Platform. 2018.11.25 11:08:56 - Updating systems & servers data ...I 2018.11.25 11:08:56 - Session starting.. 2018.11.25 11:09:04 - Systems & servers data update completedI 2018.11.25 11:09:07 - Checking authorization ...! 2018.11.25 11:09:14 - Connecting to Spica (Canada, Toronto, Ontario). 2018.11.25 11:09:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.11.25 11:09:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.11.25 11:09:20 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.11.25 11:09:20 - Connection to OpenVPN Management Interface. 2018.11.25 11:09:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.11.25 11:09:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.11.25 11:09:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.11.25 11:09:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.19:443. 2018.11.25 11:09:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.11.25 11:09:20 - OpenVPN > UDP link local: (not bound). 2018.11.25 11:09:20 - OpenVPN > UDP link remote: [AF_INET]199.19.94.19:443. 2018.11.25 11:09:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.11.25 11:09:20 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=fc270323 bb5f1333. 2018.11.25 11:09:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.11.25 11:09:21 - OpenVPN > VERIFY KU OK. 2018.11.25 11:09:21 - OpenVPN > Validating certificate extended key usage. 2018.11.25 11:09:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.11.25 11:09:21 - OpenVPN > VERIFY EKU OK. 2018.11.25 11:09:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Spica, emailAddress=info@airvpn.org. 2018.11.25 11:09:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.11.25 11:09:21 - OpenVPN > [spica] Peer Connection Initiated with [AF_INET]199.19.94.19:443. 2018.11.25 11:09:22 - OpenVPN > SENT CONTROL [spica]: 'PUSH_REQUEST' (status=1). 2018.11.25 11:09:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.172.1,dhcp-option DNS6 fde6:7a:7d20:1aac::1,tun-ipv6,route-gateway 10.30.172.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1aac::104e/64 fde6:7a:7d20:1aac::1,ifconfig 10.30.172.80 255.255.255.0,peer-id 12,cipher AES-256-GCM'. 2018.11.25 11:09:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.11.25 11:09:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.11.25 11:09:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.11.25 11:09:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.11.25 11:09:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.11.25 11:09:22 - OpenVPN > interactive service msg_channel=0. 2018.11.25 11:09:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=6 HWADDR=bc:5f:f4:1f:c7:bf. 2018.11.25 11:09:22 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.11.25 11:09:22 - OpenVPN > GetBestInterfaceEx() returned if=6. 2018.11.25 11:09:22 - OpenVPN > GDG6: II=6 DP=::/0 NH=fe80::4ed0:8aff:fe9b:57c6. 2018.11.25 11:09:22 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.11.25 11:09:22 - OpenVPN > ROUTE6_GATEWAY fe80::4ed0:8aff:fe9b:57c6 I=6. 2018.11.25 11:09:22 - OpenVPN > open_tun. 2018.11.25 11:09:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8102CA7C-1815-41AD-80D0-0D9289816985}.tap. 2018.11.25 11:09:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.11.25 11:09:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.172.0/10.30.172.80/255.255.255.0 [sUCCEEDED]. 2018.11.25 11:09:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.172.80/255.255.255.0 on interface {8102CA7C-1815-41AD-80D0-0D9289816985} [DHCP-serv: 10.30.172.254, lease-time: 31536000]. 2018.11.25 11:09:23 - OpenVPN > Successful ARP Flush on interface [8] {8102CA7C-1815-41AD-80D0-0D9289816985}. 2018.11.25 11:09:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.11.25 11:09:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=8 fde6:7a:7d20:1aac::104e store=active. 2018.11.25 11:09:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1aac::1 validate=no. 2018.11.25 11:09:46 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2018.11.25 11:09:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1aac::/64 -> fde6:7a:7d20:1aac::104e metric 0) dev Ethernet 2. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1aac::/64 interface=8 fe80::8 store=active. 2018.11.25 11:09:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:09:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.19 MASK 255.255.255.255 192.168.0.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.172.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.172.1. 2018.11.25 11:09:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.11.25 11:09:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.11.25 11:09:53 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:09:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=8 fe80::8 store=active. 2018.11.25 11:09:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:09:54 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:09:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=8 fe80::8 store=active. 2018.11.25 11:09:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:10:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=8 fe80::8 store=active. 2018.11.25 11:10:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:06 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1aac::1 metric -1) dev Ethernet 2. 2018.11.25 11:10:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=8 fe80::8 store=active. 2018.11.25 11:10:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.11.25 11:10:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.11.25 11:10:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.11.25 11:10:13 - DNS leak protection with packet filtering enabled.. 2018.11.25 11:10:41 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.6.100.1) to 10.30.172.1). 2018.11.25 11:10:51 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1aac::1). 2018.11.25 11:11:00 - Routes, added a new route, 199.19.94.193 for gateway 10.30.172.1. 2018.11.25 11:11:10 - Routes, added a new route, 2604:6880:c713:5e13:a196:b899:41c7:3787 for gateway fde6:7a:7d20:1aac::1. 2018.11.25 11:11:10 - Flushing DNSI 2018.11.25 11:11:32 - Checking route IPv4I 2018.11.25 11:11:39 - Checking route IPv6I 2018.11.25 11:11:54 - Checking DNS! 2018.11.25 11:12:01 - Connected.. 2018.11.25 11:12:01 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces and Routes: {"support_ipv4": true,"support_ipv6": true,"routes": [{"address": "0.0.0.0\/0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "192.168.0.1","metric": "35"},{"address": "0.0.0.0\/1","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "3"},{"address": "10.30.172.0\/24","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "10.30.172.80","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "10.30.172.255","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "127.0.0.0\/8","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.0.0.1","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.255.255.255","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "128.0.0.0\/1","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "3"},{"address": "192.168.0.0\/24","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "192.168.0.12","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "192.168.0.255","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "199.19.94.19","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "192.168.0.1","metric": "35"},{"address": "199.19.94.193","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "10.30.172.1","metric": "4"},{"address": "224.0.0.0\/4","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "224.0.0.0\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "224.0.0.0\/4","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "255.255.255.255","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "255.255.255.255","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "255.255.255.255","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "::\/0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "fe80::4ed0:8aff:fe9b:57c6","metric": "291"},{"address": "::\/3","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "::1","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "2000::\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "2604:6880:c713:5e13:a196:b899:41c7:3787","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fde6:7a:7d20:1aac::1","metric": "259"},{"address": "2804:14d:5c52:83a1::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "fe80::4ed0:8aff:fe9b:57c6","metric": "291"},{"address": "2804:14d:5c52:83a1::a","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1:b5f8:315a:6f2:7db0","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2804:14d:5c52:83a1:e8bd:b183:fbfb:79de","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "3000::\/4","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fc00::\/7","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fde6:7a:7d20:1aac::\/64","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "fe80::8","metric": "259"},{"address": "fde6:7a:7d20:1aac::104e","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::\/64","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::\/64","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "fe80::3550:350a:671e:cd7","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "fe80::e8bd:b183:fbfb:79de","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "ff00::\/8","interface": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "ff00::\/8","interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","gateway": "link","metric": "259"},{"address": "ff00::\/8","interface": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","gateway": "link","metric": "291"},{"address": "2604:6880:c713:5e13:a196:b899:41c7:3787","gateway": "fde6:7a:7d20:1aac::1","metric": "4294967295"}],"interfaces": [{"friendly": "Ethernet 2","id": "{8102CA7C-1815-41AD-80D0-0D9289816985}","name": "Ethernet 2","description": "TAP-Windows Adapter V9","type": "Ethernet","status": "Up","bytes_received": "154274","bytes_sent": "128022","support_ipv4": true,"support_ipv6": true,"ips": ["fde6:7a:7d20:1aac::104e","fe80::3550:350a:671e:cd7","10.30.172.80"],"gateways": ["10.30.172.1","fe80::8","fde6:7a:7d20:1aac::1"],"bind": true,"dns4": "10.30.172.1","dns6": null},{"friendly": "Ethernet","id": "{6758ACBA-92C4-4BF2-B19D-5DB2A585855D}","name": "Ethernet","description": "Realtek PCIe FE Family Controller","type": "Ethernet","status": "Up","bytes_received": "29659430","bytes_sent": "2895452","support_ipv4": true,"support_ipv6": true,"ips": ["2804:14d:5c52:83a1::a","2804:14d:5c52:83a1:e8bd:b183:fbfb:79de","2804:14d:5c52:83a1:b5f8:315a:6f2:7db0","fe80::e8bd:b183:fbfb:79de","192.168.0.12"],"gateways": ["192.168.0.1","fe80::4ed0:8aff:fe9b:57c6"],"bind": true,"dns4": "","dns6": null},{"friendly": "Loopback Pseudo-Interface 1","id": "{B900336C-ED50-11E7-B89A-806E6F6E6963}","name": "Loopback Pseudo-Interface 1","description": "Software Loopback Interface 1","type": "Loopback","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["::1","127.0.0.1"],"gateways": [],"bind": true,"dns4": "","dns6": null}],"ipv4-default-gateway": "10.30.172.1","ipv4-default-interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}","ipv6-default-gateway": "fe80::8","ipv6-default-interface": "{8102CA7C-1815-41AD-80D0-0D9289816985}"}----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Arbeitszimmer Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : rjo.virtua.com.br Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-81-02-CA-7C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1aac::104e(Preferred) Link-local IPv6 Address . . . . . : fe80::3550:350a:671e:cd7%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.30.172.80(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : November 25, 2018 11:09:22 Lease Expires . . . . . . . . . . : November 25, 2019 11:09:22 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.30.172.254 DHCPv6 IAID . . . . . . . . . . . : 369164161 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-D8-B7-B7-BC-5F-F4-1F-C7-BF DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1aac::1 10.30.172.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : rjo.virtua.com.br Description . . . . . . . . . . . : Realtek PCIe FE Family Controller Physical Address. . . . . . . . . : BC-5F-F4-1F-C7-BF DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2804:14d:5c52:83a1::a(Preferred) Lease Obtained. . . . . . . . . . : November 25, 2018 10:44:40 Lease Expires . . . . . . . . . . : November 26, 2018 10:44:39 IPv6 Address. . . . . . . . . . . : 2804:14d:5c52:83a1:e8bd:b183:fbfb:79de(Preferred) Temporary IPv6 Address. . . . . . : 2804:14d:5c52:83a1:b5f8:315a:6f2:7db0(Preferred) Link-local IPv6 Address . . . . . : fe80::e8bd:b183:fbfb:79de%6(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.12(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : November 25, 2018 10:44:39 Lease Expires . . . . . . . . . . : November 25, 2018 11:44:38 Default Gateway . . . . . . . . . : fe80::4ed0:8aff:fe9b:57c6%6 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 113008628 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-D8-B7-B7-BC-5F-F4-1F-C7-BF DNS Servers . . . . . . . . . . . : 2804:14d:1:0:181:213:132:2 2804:14d:1:0:181:213:132:3 181.213.132.2 181.213.132.3 NetBIOS over Tcpip. . . . . . . . : Enabled Any fix available? Thanks in advance.
  4. Hi, I'm running the AirVPN Eddie client on my Windows 10 64-bit machines. I was recently unable to connect to my network, but not the internet or AirVPN and remembered I had the same problem on my other machine a few months ago and this forum gave me a solution. It involved setting the IPv4 to my preferred connection through a netsh powershell command. Doing this fix I noticed that there were 50 different ethernet connections that Eddie has created and I was wondering if there is a way to delete these connections to prevent any issues moving forward? A couple screenshots for clarity:
  5. Hi, I've purchased a Windows 10 PC and I'm not overly familiar with the OS, other than the basics. I've installed Eddie and and signed in ok, but when I try to connect to any server Eddie gets to "Checking Route IPv6" and then fails to connect Then Eddie disconnects and tries to reconnect only to fail again. I'm at a loss of what to do. Any suggestions are welcomed. Thank you.
  6. Every time I try to connect I get an error message saying driver installation failed and I never actually connect. In the logs I see two things that seem to be related. "cannot find tunnel adapter" and "driver installation failed'. Any tips on what I should try to do to fix this? I 2018.02.23 18:48:00 - Session starting.. 2018.02.23 18:48:00 - Cannot find tunnel adapter.! 2018.02.23 18:48:00 - Installing tunnel driver. 2018.02.23 18:48:00 - Shell(7) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';. 2018.02.23 18:48:01 - Shell(7) done in 719 ms, exit: 0. 2018.02.23 18:48:04 - Cannot find tunnel adapter.F 2018.02.23 18:48:04 - Driver installation failed.
  7. Hy guys, so i´ve been using Air VPN on a regular basis, but not since 1 Month or so. Today i´ve tried o connect via "automatic connection" and everything went fine until after the connection has been established it always "restarts". Strange thing is, i have to log into AirVPN via browser and disconnect my client from those connections because i get the max of 5 connections per user very fast. Manual connection does the same. Creators Update? Im using an up to date Windows 10, my internet works fine aside from Eddy. I will attach my Log file in case u will need it. Thanks in advance Eddie_20171226_080649.txt
  8. I use Eddie on a Windows 10 x64 laptop, and had very few issues, and I solved all of them through very simple settings within Eddie after reading here. Recently I went to stay with a friend for a few weeks, I had been there before and haven't experienced any AirVPN-related issue associated with these visits. This time around, when I got back home again, I simply couldn't connect to the internet. All my other devices could connect to the internet (both cable and wireless), one of them (Xbox One) did suffer pretty badly from dc's if connected through wifi, but the phone and the Smart TV had good and stable wireless connection throughout the whole ordeal (and the Xbox worked flawless if connected through cable). The laptop, however, couldn't connect at all, cable or wireless didn't matter. I uninstalled Eddie, problem remained. Before this I had of course rebooted all hardware and powercycled everything in the entire network several times, I updated (or checked for updates) everything I could - hardware, software, firmware. Double and tripple checked all DNS- and IP-related settings, flushed, released and reset pretty much everything I could. On the third day I found a working combo.. change and give the laptop a static IP, uninstall VMWare Workstation, use OpenVPN instead of Eddie. If I try to use Eddie, then I can't connect to internet at all. If I re-install VMWare Workstation, same thing. If either of these are installed, I can't connect to internet even with Eddie not even running. And even with my working current config (static IP, no VMWare Workstation or Eddie installed, only OpenVPN, internet dies if I change back to DHCP / assign automatic IP. As long as it's on static, however, everything works just like it used to do with Eddie and VMWare - can connect with and without VPN, can use virtual machines and virtual network adapters (but with VirtualBox and so on instead of VMWare), nothing changes if I temporary use it on another WiFi and then get back home to my own network (cable or wireless doesn't make any difference). Anyone know what could be the issue here? I can connect now, and I guess OpenVPN serves me well although I have to learn a new application to modify the config file to be as safe as the setup I had in Eddie, but it's weird and I'd rather use the software I actually want to use. Especially when it comes to VMWare Workstation (it also worked fine with AirVPN before my trip / switching wifi temporary). I know, I should've saved logs, and I understand that I might not be able to recieve a very specific awnser here. But it's so weird and I have a feeling that I really must have missed something very, very basic..?
  9. Hi, I'm getting an error when trying to connect on Windows 10. It says: "OpenVPN: Route gateway is not reachable on any active network adapters: 10.4.0.1". It didn't do this when I first installed AirVPN Client. How can I fix this? Thanks
  10. Hey Guys, i had to reinstall my Windows on my Notebook. After the reinstall from Windows 10 (+ creators update) and the AirVPN Client, the issue started. The AirVPN Client cant connect to any server. I already googled it but couldn´t find a solution. I 2017.07.18 10:10:16 - Eddie client version: 2.13.2 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.15063.0, Mono/.Net Framework: v4.0.30319 . 2017.07.18 10:10:16 - Reading options from C:\Users\uemit\AppData\Local\AirVPN\AirVPN.xml . 2017.07.18 10:10:16 - Data path: C:\Users\uemit\AppData\Local\AirVPN . 2017.07.18 10:10:16 - Application path: C:\Program Files\AirVPN . 2017.07.18 10:10:16 - Executable path: C:\Program Files\AirVPN\AirVPN.exe . 2017.07.18 10:10:16 - Command line arguments (1): path="home" . 2017.07.18 10:10:16 - Operating System: Microsoft Windows NT 10.0.15063.0 I 2017.07.18 10:10:19 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2017.07.18 10:10:19 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) I 2017.07.18 10:10:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2017.07.18 10:10:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2017.07.18 10:10:19 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe) I 2017.07.18 10:10:19 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2017.07.18 10:10:19 - Ready . 2017.07.18 10:10:19 - Updating systems & servers data ... . 2017.07.18 10:10:20 - Systems & servers data update completed I 2017.07.18 10:10:38 - Session starting. . 2017.07.18 10:10:39 - IPv6 disabled with packet filtering. I 2017.07.18 10:10:39 - Checking authorization ... ! 2017.07.18 10:10:39 - Connecting to Edasich (Netherlands, Alblasserdam) . 2017.07.18 10:10:39 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2017.07.18 10:10:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.07.18 10:10:39 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.07.18 10:10:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.07.18 10:10:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:10:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:10:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.07.18 10:10:39 - OpenVPN > UDP link local: (not bound) . 2017.07.18 10:10:39 - OpenVPN > UDP link remote: [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:39 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.210:443, sid=98912455 955b8479 . 2017.07.18 10:10:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.07.18 10:10:39 - OpenVPN > VERIFY KU OK . 2017.07.18 10:10:39 - OpenVPN > Validating certificate extended key usage . 2017.07.18 10:10:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.07.18 10:10:39 - OpenVPN > VERIFY EKU OK . 2017.07.18 10:10:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Edasich, emailAddress=info@airvpn.org . 2017.07.18 10:10:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.07.18 10:10:39 - OpenVPN > [Edasich] Peer Connection Initiated with [AF_INET]213.152.161.210:443 . 2017.07.18 10:10:41 - OpenVPN > SENT CONTROL [Edasich]: 'PUSH_REQUEST' (status=1) . 2017.07.18 10:10:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.36.112 255.255.0.0,peer-id 18,cipher AES-256-GCM' . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.07.18 10:10:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.07.18 10:10:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2017.07.18 10:10:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.07.18 10:10:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.07.18 10:10:41 - OpenVPN > interactive service msg_channel=0 . 2017.07.18 10:10:41 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=11 HWADDR=20:89:84:d6:92:b8 . 2017.07.18 10:10:41 - OpenVPN > open_tun . 2017.07.18 10:10:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{7C4E21EF-6F14-408D-A99B-9E866F69E945}.tap . 2017.07.18 10:10:41 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.07.18 10:10:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.36.112/255.255.0.0 [SUCCEEDED] . 2017.07.18 10:10:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.36.112/255.255.0.0 on interface {7C4E21EF-6F14-408D-A99B-9E866F69E945} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.07.18 10:10:41 - OpenVPN > Successful ARP Flush on interface [10] {7C4E21EF-6F14-408D-A99B-9E866F69E945} . 2017.07.18 10:10:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.07.18 10:10:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.210 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:10:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:10:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:10:47 - OpenVPN > WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this . 2017.07.18 10:10:47 - Starting Management Interface . 2017.07.18 10:10:47 - OpenVPN > Initialization Sequence Completed . 2017.07.18 10:10:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2017.07.18 10:10:47 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2017.07.18 10:10:47 - DNS leak protection with packet filtering enabled. . 2017.07.18 10:10:47 - Flushing DNS I 2017.07.18 10:10:50 - Checking route . 2017.07.18 10:11:00 - curl: (28) Operation timed out after 10046 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:00 - Checking route (2° try) . 2017.07.18 10:11:11 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:11 - Checking route (3° try) . 2017.07.18 10:11:24 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received E 2017.07.18 10:11:24 - Checking route failed. . 2017.07.18 10:11:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.07.18 10:11:24 - Disconnecting . 2017.07.18 10:11:24 - Management - Send 'signal SIGTERM' . 2017.07.18 10:11:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.07.18 10:11:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.07.18 10:11:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.07.18 10:11:24 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.210 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:11:29 - OpenVPN > Closing TUN/TAP interface . 2017.07.18 10:11:30 - OpenVPN > TAP: DHCP address released . 2017.07.18 10:11:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.07.18 10:11:30 - Connection terminated. . 2017.07.18 10:11:30 - DNS leak protection with packet filtering disabled. . 2017.07.18 10:11:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2017.07.18 10:11:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2017.07.18 10:11:33 - Checking authorization ... ! 2017.07.18 10:11:33 - Connecting to Asellus (Netherlands, Alblasserdam) . 2017.07.18 10:11:33 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2017.07.18 10:11:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2017.07.18 10:11:33 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.07.18 10:11:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.07.18 10:11:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2017.07.18 10:11:33 - OpenVPN > UDP link local: (not bound) . 2017.07.18 10:11:33 - OpenVPN > UDP link remote: [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:33 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=b55dc02b a862b75b . 2017.07.18 10:11:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.07.18 10:11:34 - OpenVPN > VERIFY KU OK . 2017.07.18 10:11:34 - OpenVPN > Validating certificate extended key usage . 2017.07.18 10:11:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.07.18 10:11:34 - OpenVPN > VERIFY EKU OK . 2017.07.18 10:11:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.07.18 10:11:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.07.18 10:11:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.19:443 . 2017.07.18 10:11:35 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.07.18 10:11:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.86.229 255.255.0.0' . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.07.18 10:11:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.07.18 10:11:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.07.18 10:11:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.07.18 10:11:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.07.18 10:11:35 - OpenVPN > interactive service msg_channel=0 . 2017.07.18 10:11:35 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=11 HWADDR=20:89:84:d6:92:b8 . 2017.07.18 10:11:35 - OpenVPN > open_tun . 2017.07.18 10:11:35 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{7C4E21EF-6F14-408D-A99B-9E866F69E945}.tap . 2017.07.18 10:11:35 - OpenVPN > TAP-Windows Driver Version 9.21 . 2017.07.18 10:11:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.86.229/255.255.0.0 [SUCCEEDED] . 2017.07.18 10:11:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.86.229/255.255.0.0 on interface {7C4E21EF-6F14-408D-A99B-9E866F69E945} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2017.07.18 10:11:35 - OpenVPN > Successful ARP Flush on interface [10] {7C4E21EF-6F14-408D-A99B-9E866F69E945} . 2017.07.18 10:11:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.07.18 10:11:40 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:11:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2017.07.18 10:11:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2017.07.18 10:11:40 - OpenVPN > WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this . 2017.07.18 10:11:40 - Starting Management Interface . 2017.07.18 10:11:40 - OpenVPN > Initialization Sequence Completed . 2017.07.18 10:11:40 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2017.07.18 10:11:40 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2017.07.18 10:11:40 - DNS leak protection with packet filtering enabled. . 2017.07.18 10:11:40 - Flushing DNS I 2017.07.18 10:11:43 - Checking route . 2017.07.18 10:11:53 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:11:53 - Checking route (2° try) . 2017.07.18 10:12:04 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received . 2017.07.18 10:12:04 - Checking route (3° try) . 2017.07.18 10:12:16 - curl: (28) Operation timed out after 10047 milliseconds with 0 out of 0 bytes received E 2017.07.18 10:12:16 - Checking route failed. . 2017.07.18 10:12:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.07.18 10:12:17 - Disconnecting . 2017.07.18 10:12:17 - Management - Send 'signal SIGTERM' . 2017.07.18 10:12:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.07.18 10:12:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.07.18 10:12:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.178.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2017.07.18 10:12:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2017.07.18 10:12:22 - OpenVPN > Closing TUN/TAP interface . 2017.07.18 10:12:22 - OpenVPN > TAP: DHCP address released . 2017.07.18 10:12:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.07.18 10:12:22 - Connection terminated. . 2017.07.18 10:12:22 - DNS leak protection with packet filtering disabled. . 2017.07.18 10:12:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2017.07.18 10:12:22 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2017.07.18 10:12:24 - Cancel requested. . 2017.07.18 10:12:24 - IPv6 restored with packet filtering. . 2017.07.18 10:12:24 - Flushing DNS ! 2017.07.18 10:12:27 - Session terminated. . 2017.07.18 10:20:38 - Updating systems & servers data ... . 2017.07.18 10:20:39 - Systems & servers data update completed
  11. Hello users and staff of AirVPN. I have been using AirVPN for months now and the entire time I have had a dns leak. I currently use dnscrypt, but that did not affect my own openvpn connections or AirVPN connections when I was using Windows 7. I have disabled dnscrypt and switched to normal google dns servers then connected to airvpn or my own servers, still I have dns leaks. I have disabled IPv6, still I have dns leaks. I have disabled multi-honed dns in windows 10, still I have dns leaks. I have even used the option "setenv opt block-outside-dns" in my own openvpn configs.... STILL I HAVE DNS LEAKS. How can I fix dns leaks in windows 10?
  12. hi airvpn forums, i have been using airvpn for 20 days now and the service as a whole has exceeded my expectations. i'm currently getting the following pop up notification and message in my logs. "Warning: route gateway is ambiguous: 192.1xx.x.xxx (2 matches)" i'm still able to connect to the internet. i pass ip, dns and torrent detection tests at ipleak.net. i have seen a similar post in these forums but they had connectivity issues because of it. is this leaking my ip/details to the public? or is there anything else (security or otherwise) i should be worried about? billion model bipac 7404vgpx, latest version of windows 10, eddie 2.12.4 with network lock activated. my logs are attached. the warning in this file can be found 16 lines from the bottom. i receive the warning at the beginning or during a session. warning gateway is ambiguous.txt
  13. I too needed a long time before I knew how to get a printer and scanner working while online when using a VPN with either OpenVPN or Eddie the Client of AirVPN. Well the answer is much simpler than you think. You need to give your printer an IP4 address that does not change. Like 192.168.1.123 as long as you always make sure it looks like your Router IP4 Gateway adress. My printer has IP address 192.168.1.123 and if you don't understand how to do that either from within your router DHCP or from the printer itself I cannot help you unfortunately. My printer is simply at this IP4 address via a Wireless Wifi connection at the same router which has address 192.168.1.1 as most Routers do. But yours might look different. The problem with Windows 10 automatic discovery of printers and scanners it searches all network adapters and it might detect your printers and scanners even like it does here, but when on VPN I couldn't print or scan. Actually the scanner didn't even work before I knew the tricks how to install the same printer manually from an IP4 address by hand. In Windows 10 right click the start button if your right handed with your right mouse button and enter command below: control printers I would have liked to show a screenshot here but my language isn't English, so I describe that after you execute that command a Window pops up showing you devices like printers and scanners even when they might not work. Now look carefully inside that window, what does it say? ADD PRINTERbut then in your language. Well press that button. Another window pops up trying to discover devices on your network, but you should look for and press the text PRINTER I WANT IS NOT ON THIS LIST Now the magic starts to happen. It has many options to add a Printer, but you know you want a local network printer search for ADD PRINTER WITH TCP/IP ADDRESSBut then again it is in your own language but look for TCP/IP and press that option. Then press NEXT button. Another window pops up, leave automatic detection enabled. And guess what, it asks for the IP4 address for your printer, don't worry about port name that will be automatically filled. Type in your Printer IP4 address inside the IP text Area 192.168.1.123was my Printer IP4 address on my local network. Then it might ask for a driver, if you have none choose a printer that is a version higher but of same type. If you have a Deskjet choose a similar Deskjet, if you have a Laser choose a similar Laser. In my case I simply had the original driver which actually isn't necessary at all. If your printer is 4000 series and you see a driver called 4070 series try that, as long as it is the same brand of printer and same type of printer (Deskjet=Deskjet and Laser=Laser etcetera) Usually you don't need a driver at this point. Wireless printers communicate with a standard protocol hence Linux Operating Systems almost always too easily support printers and scanners. Then you have to press a few times NEXT, NEXT and maybe another NEXT. Make sure you remember how your new manually added printer that only communicates inside your local network outside any VPN is called. Software using printers or scanners like a webbrowser need a simple adjustment. That is when you print you must select the new printer or scanner you just added by hand. Please let me know if this works for you, and if you are English, can you do these steps with screenshots and place them in yours? I have a strange language you don't understand, So hence my screenshots would not explain it to you, but in English it does. I cannot for example tell you how to access the configuration panel in your language but that is why I told you it all starts with a simple command to execute control printers In my case my scanner wasn't even working without VPN and when I executed MSPAINT.EXE, I could even scan wireless when either with or without VPN enabled or disabled. Before I could only print or install hundreds of Megabytes from HP Printer Driver. Remember the name and IP4 address from your printer that is all you need. Don't rely on auto detection when on VPN.
  14. I have been using Spybot Anti-beacon since before the creators update. It appears to still be working after the update to creators. Are there any other pieces of software that I could use to block telemetry?
  15. I cannot use the VPN, new installation ! 2017.04.14 15:12:01 - Connecting to Agena (Canada, Toronto, Ontario) .......(all ok until)........ . 2017.04.14 15:12:07 - Flushing DNS I 2017.04.14 15:12:10 - Checking route E 2017.04.14 15:12:11 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:11 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:11 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:11 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:11 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:11 - using the --cacert option. E 2017.04.14 15:12:11 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:11 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:11 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:11 - not match the domain name in the URL). E 2017.04.14 15:12:11 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:11 - the -k (or --insecure) option. . 2017.04.14 15:12:11 - Checking route (2° try) E 2017.04.14 15:12:12 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:12 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:12 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:12 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:12 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:12 - using the --cacert option. E 2017.04.14 15:12:12 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:12 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:12 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:12 - not match the domain name in the URL). E 2017.04.14 15:12:12 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:12 - the -k (or --insecure) option. . 2017.04.14 15:12:12 - Checking route (3° try) E 2017.04.14 15:12:15 - curl: (60) SSL certificate problem: unable to get local issuer certificate E 2017.04.14 15:12:15 - More details here: http://curl.haxx.se/docs/sslcerts.html E 2017.04.14 15:12:15 - curl performs SSL certificate verification by default, using a "bundle" E 2017.04.14 15:12:15 - of Certificate Authority (CA) public keys (CA certs). If the default E 2017.04.14 15:12:15 - bundle file isn't adequate, you can specify an alternate file E 2017.04.14 15:12:15 - using the --cacert option. E 2017.04.14 15:12:15 - If this HTTPS server uses a certificate signed by a CA represented in E 2017.04.14 15:12:15 - the bundle, the certificate verification probably failed due to a E 2017.04.14 15:12:15 - problem with the certificate (it might be expired, or the name might E 2017.04.14 15:12:15 - not match the domain name in the URL). E 2017.04.14 15:12:15 - If you'd like to turn off curl's verification of the certificate, use E 2017.04.14 15:12:15 - the -k (or --insecure) option. E 2017.04.14 15:12:15 - Routing checking failed. . 2017.04.14 15:12:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2017.04.14 15:12:15 - Disconnecting
  16. Hello, I am unable to connect using AirVPN to any server. I have tried the FAQ located at http://openvpn.net/faq.html#dhcpclientserv but still cannot connect. System Info Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319 Operating System: Microsoft Windows NT 10.0.14393.0 OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 When trying to connect I get this about 25 times OpenVPN > Route: Waiting for TUN/TAP interface to come up... Eddie Windows Interface Hack executed (AirVPN) OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down Key Log Info OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 OpenVPN > Route addition via IPAPI failed [adaptive] OpenVPN > Route addition fallback to route.exe ~~~~~~~ Starting Management Interface penVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) Disconnecting Send 'signal SIGTERM' Full Log Any ideas? Thanks
  17. Whenever I read something about Windows 10, be it a news article or a forum post, I also read the word "privacy nightmare". It refers to excessive data collection practices by Microsoft's new operating system. Some of these can't even be disabled by going the usual way using built-in settings. Luckily, these are the forums of a VPN provider where you can find guides on what to look out for when you want to forcibly shut down the unnecessary "spying". And I wanted to contribute to this by introducing software which helps with this task. O&O ShutUp10 Focused on privacy settingsMust be installed: NoIcons after every setting warn you about possible risksShows you what exactly is changedConvenient search if you look for a specific settingDoNotSpy10 Focused on disabling services like Cortana, sensors, telemetry, and othersMust be installed: Yestraffic light coloring of settings indicates possible impact on the systemshows brief explanations for every settingfree download is ad-supportedW10Privacy Focused on privacy settings and all pre-installed appsMust be installed: NoMore detailed toggles, like just preventing OneDrive's sync feature instead of disabling/uninstalling it as a wholetraffic light coloring of every setting indicates possible impact on the systemhovering over a setting shows some info on what is done when toggledMaybe we should not ditch the OS but ditch the name: Microsoft Privacy Nightmare, or PN. Microsoft PN. Would really be a witty step after the last creative developer left Microsoft sometime after the Vista release. If you ask me, they instead hired devs who get an instant erection seeing so much data.... from just one Win10 installation.
  18. Like some others here, I too have an issue on Windows where after "Checking route", the vpn client throws out the error from the title and doesn't connect to a server. I've played around with different settings while reading logs trying to see what causes it and it seems that for some reason either Windows or the vpn client dislike when both your default (ISP) network connection and the TAP (VPN) network connection have the same DNS settings. Fortunately, there's an easy workaround: 1) Make sure your default network connection's DNS are not one of AirVPN DNS servers (i.e. not 10.4.0.1). It can be either automatic or some of your other favorite DNS servers. 2) Check that the TAP network connection is set to automatic DNS servers (don't put any in manually). 3) In the 2.11 beta vpn client (I haven't tested on 2.10 stable) open Preferences (and click on "Reset to default settings" just in case) -> Advanced -> and then uncheck "Force all network interfaces for DNS". After that open the DNS settings tab just to make sure everything in there is set to default values (DNS Switch mode - Automatic, Check AirVPN DNS - yes, DNS Servers - blank). That's it. Now, there's one thing I'd like to mention. When doing all this I was worried that I would have a DNS leak because when I was using a different VPN service it would occasionally leak the DNS set in my default network connection's settings. However I've tested it out and there's no leak, and if you want to test it out for yourself I suggest using both ipleak and doileak, and for best results make sure you disconnect and reconnect several times to the same server and a few other servers in between tests, just to cover a wider ground. Feel free to ask questions or leave comments. P.S. As a general tip - I recommend you don't use your ISP's DNS settings for your default connection (unless you have to) cause there are some great uncensored and faster DNS servers out there. And as for the VPN DNS server I recommend you do stick with default AirVPN DNS servers cause it's useful having your IP and DNS address be the same.
  19. I've been completely unable to get a reliable connection to AirVPN ever since I installed Windows 10. Typically it will connect, then appear to 'freeze up', then go through a cycle of multiple disconnect/reconnects ad infinitum. I think this issue actually originated earlier with Win7 but wasn't as frequently occurring. Sometimes it appears to work albeit erratically but as soon as I launch eMule - Bam! Data rates drop to a few 10s of bytes per second and shortly thereafter the disconnect/reconnect cycle begins. It used to be that removing the tap driver and allowing the client to reinstall it seemed to fix the issue for that one time connection (immediately after the reinstall), but now that doesn't even work reliably. About once in every 10 connection attempts I'll get a connection that works and stays stable. Linux connection seems OK, my next step will be to set up a Linux VM to use in the hope of getting some use out of the service.
  20. Just installed the most recent Windows 10 update, been looking around the site but haven't found a definitive solution. I keep disconnecting as it is checking the route, I've tried unchecking "Check if the tunnel uses AirVPN DNS", but that results in a faulty connection. Logs: I 2016.12.06 23:38:00 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.12.06 23:38:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.12.06 23:38:00 - Data Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - App Path: C:\Program Files\AirVPN. 2016.12.06 23:38:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.12.06 23:38:00 - Command line arguments (0):. 2016.12.06 23:38:00 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.12.06 23:38:00 - Updating systems & servers data ...I 2016.12.06 23:38:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.12.06 23:38:00 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.12.06 23:38:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.12.06 23:38:00 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.12.06 23:38:00 - Ready. 2016.12.06 23:38:01 - Systems & servers data update completedI 2016.12.06 23:38:02 - Session starting.I 2016.12.06 23:38:02 - IPv6 disabled.I 2016.12.06 23:38:08 - Checking authorization ...! 2016.12.06 23:38:09 - Connecting to Cursa (United States, Miami). 2016.12.06 23:38:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:38:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:38:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:38:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:38:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link remote: [AF_INET]96.47.229.58:443. 2016.12.06 23:38:09 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.58:443, sid=66b5f82a a1377c50. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:38:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:38:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:38:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:38:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:38:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.58:443. 2016.12.06 23:38:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:38:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.21 255.255.0.0'. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:38:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:38:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:38:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:38:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:38:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.21/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:38:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.21/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:38:11 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:38:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:38:16 - Starting Management Interface. 2016.12.06 23:38:16 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:38:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:38:16 - Flushing DNSI 2016.12.06 23:38:16 - Checking routeW 2016.12.06 23:38:40 - The remote name could not be resolved: 'cursa_exit.airservers.org'! 2016.12.06 23:38:40 - Disconnecting. 2016.12.06 23:38:40 - Management - Send 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:38:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:38:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.58 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:38:45 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:38:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:38:45 - Connection terminated.I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:38:48 - Cancel requested.I 2016.12.06 23:38:48 - IPv6 restored.! 2016.12.06 23:38:48 - Session terminated.I 2016.12.06 23:43:24 - Session starting.I 2016.12.06 23:43:24 - IPv6 disabled.I 2016.12.06 23:43:25 - Checking authorization ...! 2016.12.06 23:43:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:43:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:43:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:43:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:43:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:43:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:43:25 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=6c854023 923066a3. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Validating certificate key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:43:25 - OpenVPN > VERIFY KU OK. 2016.12.06 23:43:25 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:43:25 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:43:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:43:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:43:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:43:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:43:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:43:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:43:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:43:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:43:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:43:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:43:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:43:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:43:33 - Starting Management Interface. 2016.12.06 23:43:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:43:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:43:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:43:33 - Flushing DNSI 2016.12.06 23:43:33 - Checking DNSW 2016.12.06 23:43:57 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:43:57 - Disconnecting. 2016.12.06 23:43:57 - Management - Send 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:43:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:43:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:44:02 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:44:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:44:02 - Connection terminated.I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:44:05 - Cancel requested.I 2016.12.06 23:44:05 - IPv6 restored.! 2016.12.06 23:44:05 - Session terminated.I 2016.12.06 23:50:11 - Session starting.I 2016.12.06 23:50:11 - IPv6 disabled.I 2016.12.06 23:50:11 - Checking authorization ...! 2016.12.06 23:50:11 - Connecting to Acamar (United States, Miami). 2016.12.06 23:50:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:50:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:50:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:50:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:50:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:50:11 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=b96b8d3e 113c910e. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:50:11 - OpenVPN > Validating certificate key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:50:11 - OpenVPN > VERIFY KU OK. 2016.12.06 23:50:11 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:50:11 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:50:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:50:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:50:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:50:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:50:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:50:14 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:50:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:50:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:50:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:50:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:50:14 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:50:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:50:19 - Starting Management Interface. 2016.12.06 23:50:19 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:50:19 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:50:19 - Flushing DNSI 2016.12.06 23:50:19 - Checking DNSW 2016.12.06 23:50:43 - The remote name could not be resolved: 'acamar_exit.airservers.org'! 2016.12.06 23:50:44 - Disconnecting. 2016.12.06 23:50:44 - Management - Send 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:50:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:50:49 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:50:49 - Connection terminated.I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:50:49 - Cancel requested.I 2016.12.06 23:50:49 - IPv6 restored.! 2016.12.06 23:50:49 - Session terminated.I 2016.12.06 23:52:25 - Session starting.I 2016.12.06 23:52:25 - IPv6 disabled.I 2016.12.06 23:52:25 - Checking authorization ...! 2016.12.06 23:52:25 - Connecting to Acamar (United States, Miami). 2016.12.06 23:52:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:52:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:52:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=061a5617 c2c9cd1f. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Validating certificate key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:52:26 - OpenVPN > VERIFY KU OK. 2016.12.06 23:52:26 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:52:26 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:52:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:52:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:52:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:52:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:52:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:52:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:52:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:52:33 - Starting Management Interface. 2016.12.06 23:52:33 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:52:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:52:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:52:33 - Flushing DNS! 2016.12.06 23:52:33 - Connected.. 2016.12.06 23:52:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:52:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:53:30 - Disconnecting. 2016.12.06 23:53:30 - Management - Send 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:53:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:53:35 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:53:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:53:35 - Connection terminated.I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:53:35 - IPv6 restored.! 2016.12.06 23:53:35 - Session terminated.I 2016.12.06 23:57:04 - Session starting.I 2016.12.06 23:57:04 - IPv6 disabled.I 2016.12.06 23:57:04 - Checking authorization ...! 2016.12.06 23:57:04 - Connecting to Acamar (United States, Miami). 2016.12.06 23:57:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:57:04 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=3144bc70 76c93ca4. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:05 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:05 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:05 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:57:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:07 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:12 - Starting Management Interface. 2016.12.06 23:57:12 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:12 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:12 - Flushing DNS! 2016.12.06 23:57:12 - Connected.. 2016.12.06 23:57:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:57:36 - Disconnecting. 2016.12.06 23:57:36 - Management - Send 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:57:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:57:41 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:57:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:57:41 - Connection terminated.I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:57:44 - Checking authorization ...! 2016.12.06 23:57:44 - Connecting to Yildun (United States, Miami). 2016.12.06 23:57:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:57:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:57:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:57:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443. 2016.12.06 23:57:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2c89d04c abcce70e. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:57:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:57:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:57:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:57:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443. 2016.12.06 23:57:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:57:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.64 255.255.0.0'. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:57:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:57:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:57:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:57:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.64/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.64/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:57:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:57:52 - Starting Management Interface. 2016.12.06 23:57:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:57:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:57:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:57:52 - Flushing DNS! 2016.12.06 23:57:52 - Connected.. 2016.12.06 23:57:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:57:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.06 23:58:03 - Disconnecting. 2016.12.06 23:58:03 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:08 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:08 - Connection terminated.I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:08 - IPv6 restored.! 2016.12.06 23:58:08 - Session terminated.I 2016.12.06 23:58:09 - Session starting.I 2016.12.06 23:58:09 - IPv6 disabled.I 2016.12.06 23:58:09 - Checking authorization ...! 2016.12.06 23:58:09 - Connecting to Acamar (United States, Miami). 2016.12.06 23:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=8e90e690 ea17a30b. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:58:09 - OpenVPN > Validating certificate key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:58:09 - OpenVPN > VERIFY KU OK. 2016.12.06 23:58:09 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:58:09 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:58:12 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:58:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:58:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:58:12 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:58:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:58:17 - Starting Management Interface. 2016.12.06 23:58:17 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:58:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:58:17 - Flushing DNS! 2016.12.06 23:58:17 - Connected.. 2016.12.06 23:58:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.06 23:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2016.12.06 23:58:32 - Disconnecting. 2016.12.06 23:58:32 - Management - Send 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.06 23:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.06 23:58:37 - OpenVPN > Closing TUN/TAP interface. 2016.12.06 23:58:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.06 23:58:37 - Connection terminated.I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.06 23:58:37 - IPv6 restored.! 2016.12.06 23:58:37 - Session terminated.I 2016.12.06 23:59:43 - Session starting.I 2016.12.06 23:59:43 - IPv6 disabled.I 2016.12.06 23:59:43 - Checking authorization ...! 2016.12.06 23:59:44 - Connecting to Acamar (United States, Miami). 2016.12.06 23:59:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.12.06 23:59:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.12.06 23:59:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.06 23:59:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link local: [undef]. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443. 2016.12.06 23:59:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=cdf0a51f fc693d36. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Validating certificate key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.06 23:59:44 - OpenVPN > VERIFY KU OK. 2016.12.06 23:59:44 - OpenVPN > Validating certificate extended key usage. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.06 23:59:44 - OpenVPN > VERIFY EKU OK. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.06 23:59:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.06 23:59:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443. 2016.12.06 23:59:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.06 23:59:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.06 23:59:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.06 23:59:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.06 23:59:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap. 2016.12.06 23:59:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.06 23:59:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [sUCCEEDED]. 2016.12.06 23:59:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.12.06 23:59:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}. 2016.12.06 23:59:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.06 23:59:52 - Starting Management Interface. 2016.12.06 23:59:52 - OpenVPN > Initialization Sequence CompletedI 2016.12.06 23:59:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2016.12.06 23:59:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.12.06 23:59:52 - Flushing DNS! 2016.12.06 23:59:52 - Connected.. 2016.12.06 23:59:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.12.06 23:59:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.12.07 00:00:12 - Disconnecting. 2016.12.07 00:00:12 - Management - Send 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.07 00:00:12 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.12.07 00:00:17 - OpenVPN > Closing TUN/TAP interface. 2016.12.07 00:00:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.12.07 00:00:17 - Connection terminated.I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.12.07 00:00:17 - IPv6 restored.! 2016.12.07 00:00:17 - Session terminated. If I could get some advice on how to fix this issue it would be much appreciated!
  21. I have a dual boot system with Windows 7 Ultimate 64 and Windows 10 Pro 64. With the latest OpenVPM and TAP, and Eddie 2.10.3, everything works perfectly on Windows 7. Great speeds, no connection lag. However, with the EXACT same setup on Windows 10, the client will sit in an infinite loop trying to Check Route before failing. This is with Preferences->Advanced->DNS set to Automatic. If I manually set my Ethernet and Tap adapter DNS server to 10.50.0.1, and set Preferences->Advanced->DNS to Disable, and enter 10.50.0.1 in the server list there, the client will connect, but DNS lookups take 30+ seconds and frequently timeout, and leak tests reveal that my ISP DNS is being used, probably as a fallback. Is this a known bug with the Eddie client and Windows 10? Is there any way to solve this?
  22. I have a Win 10 pc and all of a sudden a few days ago I became unable to connect. The PC has internet (had to reset the DNS to get this though). I have tried restoring PC as well as upgrading and downgrading eddie and the Taps drivers. Am lost now, HELP I 2016.05.06 19:48:19 - Session starting. I 2016.05.06 19:48:19 - Checking authorization ... ! 2016.05.06 19:48:19 - Connecting to Zibal (Netherlands, Alblasserdam) . 2016.05.06 19:48:19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015 . 2016.05.06 19:48:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.05.06 19:48:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2016.05.06 19:48:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.05.06 19:48:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.05.06 19:48:19 - OpenVPN > UDPv4 link local: [undef] . 2016.05.06 19:48:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.148:443, sid=6d9eb402 5f7fd641 . 2016.05.06 19:48:19 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:19 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:22 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:22 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:23 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:23 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.05.06 19:48:24 - OpenVPN > Validating certificate key usage . 2016.05.06 19:48:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.05.06 19:48:24 - OpenVPN > VERIFY KU OK . 2016.05.06 19:48:24 - OpenVPN > Validating certificate extended key usage . 2016.05.06 19:48:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.05.06 19:48:24 - OpenVPN > VERIFY EKU OK . 2016.05.06 19:48:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #7 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #8 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #9 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #11 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #13 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #14 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #15 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #16 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #18 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #19 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #20 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #21 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #22 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #23 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #24 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #25 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #27 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:24 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:29 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #28 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:29 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #29 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #30 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #31 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #32 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #33 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #34 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:31 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:31 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #37 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #38 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #39 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #40 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.06 19:48:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.05.06 19:48:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.05.06 19:48:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.05.06 19:48:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #41 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:36 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.05.06 19:48:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.144 255.255.0.0' . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.05.06 19:48:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.05.06 19:48:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.05.06 19:48:38 - OpenVPN > open_tun, tt->ipv6=0 . 2016.05.06 19:48:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BFA0CAE0-2727-4019-B285-69416297C740}.tap . 2016.05.06 19:48:38 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.05.06 19:48:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.144/255.255.0.0 [sUCCEEDED] . 2016.05.06 19:48:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.144/255.255.0.0 on interface {BFA0CAE0-2727-4019-B285-69416297C740} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.05.06 19:48:38 - OpenVPN > Successful ARP Flush on interface [7] {BFA0CAE0-2727-4019-B285-69416297C740} . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #42 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43 / time = (1462560514) Fri May 06 19:48:34 2016 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > TLS Error: incoming packet authentication failed from [AF_INET]213.152.161.148:443 . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:48:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.148 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:48:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.05.06 19:48:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.05.06 19:48:44 - Starting Management Interface . 2016.05.06 19:48:44 - OpenVPN > Initialization Sequence Completed I 2016.05.06 19:48:44 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.05.06 19:48:44 - DNS of a network adapter forced (Intel® 82579V Gigabit Network Connection) I 2016.05.06 19:48:44 - Flushing DNS I 2016.05.06 19:48:44 - Checking route W 2016.05.06 19:49:44 - The operation has timed out . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #7 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #8 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.05.06 19:49:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #9 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings ! 2016.05.06 19:49:44 - Disconnecting . 2016.05.06 19:49:44 - Management - Send 'signal SIGTERM' . 2016.05.06 19:49:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.05.06 19:49:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.05.06 19:49:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.148 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.05.06 19:49:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.05.06 19:49:49 - OpenVPN > Closing TUN/TAP interface . 2016.05.06 19:49:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.05.06 19:49:49 - Connection terminated. I 2016.05.06 19:49:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.05.06 19:49:49 - DNS of a network adapter restored to original settings (Intel® 82579V Gigabit Network Connection) I 2016.05.06 19:49:52 - Cancel requested. ! 2016.05.06 19:49:52 - Session terminated.
  23. Hi all, I recently went from 1Mbps service to using my cricket wireless via usb tethering which is 8Mbps (not fast but best i can get where i am). I want to use AirVPN to hide the fact that I am tethering since on the "unlimited" plan they don't let you tether (I am not rooted but am using Foxfi to bypass this). my problem is that I have downloaded OpenVPN for android and installed it on my phone while following the instructions on this site, but have no knowledge of how to port forward anything, the few instructions I have tried to follow as well as multiple google searches have produced nothing but aggravation, I'm sure it's something very simple that I'm not doing or configuring correctly. Any kind of assistance with this would be greatly appreciated. Thanks.
  24. Hello! I'm getting disconnects and tried some solutions. But obviously nothing helped. Infos: Windows 10 (up-to-date) TAP 9.9.2_3 (9.21.2 changes nothing, Updating deactivated) TAP V9 Options -> Advanced -> Media Status: Always Connected Eddy 2.11.3 Driver Update Disabled Buffer Size: 256 KB I uninstalled Eddy and deleted all Files several times and resetted the Windows Firewall Settings to default. Went into Windows Safe Mode to uninstall the TAP Driver and installed TAP 9.9.2_3. Then rebooted normally and installed Eddy 2.11.3 again. But I'm still getting disconnects ... or 0 bit/s I 2016.10.06 17:22:56 - Eddie client version: 2.11.3 / x64, System: Windows, Name: Microsoft Windows NT 10.0.10586.0 / x64 . 2016.10.06 17:22:56 - Reading options from C:\Users\-Nocturnoz-\AppData\Local\AirVPN\AirVPN.xml . 2016.10.06 17:22:57 - Data Path: C:\Users\-Nocturnoz-\AppData\Local\AirVPN . 2016.10.06 17:22:57 - App Path: C:\Program Files\AirVPN . 2016.10.06 17:22:57 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.10.06 17:22:57 - Command line arguments (1): path="home" . 2016.10.06 17:22:57 - Operating System: Microsoft Windows NT 10.0.10586.0 W 2016.10.06 17:22:57 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.2. E 2016.10.06 17:22:57 - OpenVPN Driver - Not available - Will be installed at next connection. I 2016.10.06 17:22:57 - OpenVPN - Version: OpenVPN 2.3.11 (C:\Program Files\AirVPN\openvpn.exe) I 2016.10.06 17:22:57 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.10.06 17:22:57 - SSL - Version: stunnel 5.32 (C:\Program Files\AirVPN\stunnel.exe) ! 2016.10.06 17:22:57 - Ready . 2016.10.06 17:22:57 - Updating systems & servers data ... . 2016.10.06 17:22:57 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (Die Verbindung mit dem Remoteserver kann nicht hergestellt werden.) W 2016.10.06 17:23:05 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.2. I 2016.10.06 17:24:31 - Checking login ... F 2016.10.06 17:24:31 - Cannot login. (Die Verbindung mit dem Remoteserver kann nicht hergestellt werden.) I 2016.10.06 17:24:44 - Checking login ... ! 2016.10.06 17:24:45 - Logged in. ! 2016.10.06 17:24:47 - Activation of Network Lock - Windows Filtering Platform I 2016.10.06 17:24:49 - Session starting. I 2016.10.06 17:24:49 - IPv6 disabled with packet filtering. I 2016.10.06 17:24:49 - Checking authorization ... ! 2016.10.06 17:24:50 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2016.10.06 17:24:50 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 17:24:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 17:24:50 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 17:24:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 17:24:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 17:24:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 17:24:50 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 17:24:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443 . 2016.10.06 17:24:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=b94c2548 a6c8f076 . 2016.10.06 17:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 17:24:50 - OpenVPN > Validating certificate key usage . 2016.10.06 17:24:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 17:24:50 - OpenVPN > VERIFY KU OK . 2016.10.06 17:24:50 - OpenVPN > Validating certificate extended key usage . 2016.10.06 17:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 17:24:50 - OpenVPN > VERIFY EKU OK . 2016.10.06 17:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 17:24:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 17:24:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 17:24:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 17:24:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 17:24:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443 . 2016.10.06 17:24:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 17:24:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.165 255.255.0.0' . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 17:24:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 17:24:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 17:24:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 17:24:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 17:24:53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 17:24:53 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 17:24:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.165/255.255.0.0 [SUCCEEDED] . 2016.10.06 17:24:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.165/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.06 17:24:53 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 17:24:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.06 17:24:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 17:24:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 17:24:57 - Starting Management Interface . 2016.10.06 17:24:57 - OpenVPN > Initialization Sequence Completed I 2016.10.06 17:24:57 - DNS leak protection with packet filtering enabled. I 2016.10.06 17:24:57 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1) I 2016.10.06 17:24:57 - Flushing DNS I 2016.10.06 17:24:57 - Checking route I 2016.10.06 17:25:06 - Checking DNS ! 2016.10.06 17:25:06 - Connected. . 2016.10.06 17:25:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 17:25:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 17:30:50 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5557 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:30:50 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #5558 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12565 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12660 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:31:56 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #12661 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17498 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #17499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:33:28 - Updating systems & servers data ... . 2016.10.06 17:33:28 - Systems & servers data update completed . 2016.10.06 17:34:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26903 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:34:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #26904 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35154 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #35155 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:52 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:35:52 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #36962 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:02 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #38162 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #45107 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:36:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #45108 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #70478 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #70479 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #73553 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:41:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #73554 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:42:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #74219 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:42:51 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #76696 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 17:43:40 - Updating systems & servers data ... . 2016.10.06 17:43:41 - Systems & servers data update completed . 2016.10.06 17:53:47 - Updating systems & servers data ... . 2016.10.06 17:53:47 - Systems & servers data update completed . 2016.10.06 18:03:51 - Updating systems & servers data ... . 2016.10.06 18:03:52 - Systems & servers data update completed . 2016.10.06 18:13:55 - Updating systems & servers data ... . 2016.10.06 18:13:55 - Systems & servers data update completed . 2016.10.06 18:16:44 - OpenVPN > TUN/TAP I/O operation aborted, restarting . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.10.06 18:16:44 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:16:44 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:16:44 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:16:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.10.06 18:16:44 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.10.06 18:16:44 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:16:44 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:16:44 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:16:44 - OpenVPN > Closing TUN/TAP interface . 2016.10.06 18:16:44 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting . 2016.10.06 18:16:44 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:16:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:16:44 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:16:44 - OpenVPN > Restart pause, 10 second(s) ! 2016.10.06 18:16:44 - Disconnecting . 2016.10.06 18:16:44 - Management - Send 'signal SIGTERM' . 2016.10.06 18:16:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.06 18:16:44 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2016.10.06 18:16:44 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.10.06 18:16:44 - Connection terminated. I 2016.10.06 18:16:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) I 2016.10.06 18:16:44 - DNS leak protection with packet filtering disabled. I 2016.10.06 18:16:49 - Checking authorization ... ! 2016.10.06 18:16:49 - Connecting to Gienah (Netherlands, Alblasserdam) . 2016.10.06 18:16:49 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:16:49 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:16:49 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:16:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 18:16:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 18:16:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 18:16:50 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 18:16:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.95:53 . 2016.10.06 18:16:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.95:53, sid=1e8e0b6a 828336bd . 2016.10.06 18:16:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 18:16:50 - OpenVPN > Validating certificate key usage . 2016.10.06 18:16:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 18:16:50 - OpenVPN > VERIFY KU OK . 2016.10.06 18:16:50 - OpenVPN > Validating certificate extended key usage . 2016.10.06 18:16:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 18:16:50 - OpenVPN > VERIFY EKU OK . 2016.10.06 18:16:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 18:16:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:16:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:16:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:16:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 18:16:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.95:53 . 2016.10.06 18:16:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 18:16:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.8 255.255.0.0' . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 18:16:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 18:16:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 18:16:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 18:16:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 18:16:52 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 18:16:52 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 18:16:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.8/255.255.0.0 [SUCCEEDED] . 2016.10.06 18:16:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.8/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.8.255.254, lease-time: 31536000] . 2016.10.06 18:16:52 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 18:16:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.10.06 18:16:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.10.06 18:16:58 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.10.06 18:17:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:17:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:17:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:17:02 - Starting Management Interface . 2016.10.06 18:17:02 - OpenVPN > Initialization Sequence Completed I 2016.10.06 18:17:02 - DNS leak protection with packet filtering enabled. I 2016.10.06 18:17:02 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1) I 2016.10.06 18:17:02 - Flushing DNS I 2016.10.06 18:17:02 - Checking route I 2016.10.06 18:17:05 - Checking DNS ! 2016.10.06 18:17:05 - Connected. . 2016.10.06 18:17:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 18:17:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 18:19:50 - Updating systems & servers data ... ! 2016.10.06 18:19:52 - Disconnecting . 2016.10.06 18:19:52 - Management - Send 'signal SIGTERM' . 2016.10.06 18:19:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.06 18:19:52 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:19:57 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Element nicht gefunden. . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.10.06 18:19:57 - OpenVPN > Route deletion fallback to route.exe . 2016.10.06 18:19:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:19:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:19:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.06 18:19:57 - OpenVPN > Closing TUN/TAP interface . 2016.10.06 18:19:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.06 18:19:57 - Connection terminated. I 2016.10.06 18:19:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic) I 2016.10.06 18:19:57 - DNS leak protection with packet filtering disabled. I 2016.10.06 18:20:00 - Checking authorization ... ! 2016.10.06 18:20:00 - Connecting to Gienah (Netherlands, Alblasserdam) . 2016.10.06 18:20:00 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 1 2016 . 2016.10.06 18:20:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.06 18:20:00 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.06 18:20:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.06 18:20:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.06 18:20:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.06 18:20:00 - OpenVPN > UDPv4 link local: [undef] . 2016.10.06 18:20:00 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.95:53 . 2016.10.06 18:20:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.95:53, sid=de2d5383 0a0313f2 . 2016.10.06 18:20:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.06 18:20:00 - OpenVPN > Validating certificate key usage . 2016.10.06 18:20:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.06 18:20:00 - OpenVPN > VERIFY KU OK . 2016.10.06 18:20:00 - OpenVPN > Validating certificate extended key usage . 2016.10.06 18:20:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.06 18:20:00 - OpenVPN > VERIFY EKU OK . 2016.10.06 18:20:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.06 18:20:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:20:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.06 18:20:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.06 18:20:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.06 18:20:01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.95:53 . 2016.10.06 18:20:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.06 18:20:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.8 255.255.0.0' . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.06 18:20:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.06 18:20:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=98:de:d0:0d:c8:98 . 2016.10.06 18:20:03 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.06 18:20:03 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.06 18:20:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B93D7467-D877-4F52-84BF-612D7A286F22}.tap . 2016.10.06 18:20:03 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.10.06 18:20:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.8/255.255.0.0 [SUCCEEDED] . 2016.10.06 18:20:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.8/255.255.0.0 on interface {B93D7467-D877-4F52-84BF-612D7A286F22} [DHCP-serv: 10.8.255.254, lease-time: 31536000] . 2016.10.06 18:20:03 - OpenVPN > Successful ARP Flush on interface [32] {B93D7467-D877-4F52-84BF-612D7A286F22} . 2016.10.06 18:20:06 - Systems & servers data update completed . 2016.10.06 18:20:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.95 MASK 255.255.255.255 192.168.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1 . 2016.10.06 18:20:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2016.10.06 18:20:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.06 18:20:08 - Starting Management Interface . 2016.10.06 18:20:08 - OpenVPN > Initialization Sequence Completed I 2016.10.06 18:20:08 - DNS leak protection with packet filtering enabled. I 2016.10.06 18:20:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1) I 2016.10.06 18:20:08 - Flushing DNS I 2016.10.06 18:20:08 - Checking route I 2016.10.06 18:20:09 - Checking DNS ! 2016.10.06 18:20:09 - Connected. . 2016.10.06 18:20:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.10.06 18:20:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1483 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1733 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1734 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1939 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1940 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:20:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2282 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:24:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #14928 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:26:26 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #23716 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2016.10.06 18:30:17 - Updating systems & servers data ... . 2016.10.06 18:30:17 - Systems & servers data update completed . 2016.10.06 18:40:20 - Updating systems & servers data ... . 2016.10.06 18:40:54 - Systems & servers data update completed
  25. Hello fellow AirVPN users, Here is my issue that I'm experiencing with AirVPN: Problem: I'm experiencing issues with IPv4 and IPv6 connectivity on my Windows 10 machine. I started experiencing this shortly after installing the AirVPN client. I mainly use this machine on one of two WiFi networks (home and work) and the issue behaves differently on each network. Work Network: On my work network, "No Network Access" is displayed for both IPv4 and IPv6 connectivity on my WiFi status dialog box. I cannot make any sort of internet connection on any application on this network nor can I log-in or connect to AirVPN. I also see a yellow triangle over my WiFi icon on my Windows notifications taskbar. Home Network: After restarting/rebooting/booting/waking the computer, the WiFi status lists "No Network Access" for both IPv4 & 6 connectivity. However, when I try to log-in and start an AirVPN server connection through the client, the IPv4 connectivity status changes to "Internet" while the IPv6 connection remains on "No Network Access." The yellow triangle disappears over my taskbar WiFi icon and I'm able to connect to the internet with my browser. My IP address seems to be properly displayed as my AirVPN server's IP and no DNS leak is detected by dnsleaktest.com. However, I used to have IPv6 connectivity on this network prior to installing AirVPN client on this machine. If I disconnect and close AirVPN, the IPv4 connection remains on. Attempted Solutions: 1. Disabled network lock 2. Ran Windows Network Diagnosis: stated that machine seems to be configured correctly yet DNS connectivity cannot be obtained. 3. Ran a series of "netsh int tcp set..." commands based on the instructions at this website. No success. Any help would be appreciated. AirVPN works well on my Linux machines but it's critical that I'm able to use it on this Windows machine. Thanks!!
×
×
  • Create New...