Jump to content
Not connected, Your IP: 18.222.108.18
Guest

Cannot connect to AirVPN

Recommended Posts

Guest

Today I repurchased Air but for whatever reason it is unable to connect. 

 

I 2016.02.09 16:33:33 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.02.09 16:33:33 - Reading options from C:\Users\Micah\AppData\Local\AirVPN\AirVPN.xml
. 2016.02.09 16:33:33 - Data Path: C:\Users\M\AppData\Local\AirVPN
. 2016.02.09 16:33:33 - App Path: C:\Program Files\AirVPN
. 2016.02.09 16:33:33 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.02.09 16:33:33 - Command line arguments (1): path="home"
. 2016.02.09 16:33:33 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.02.09 16:33:33 - Updating systems & servers data ...
I 2016.02.09 16:33:33 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.02.09 16:33:33 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.02.09 16:33:33 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.02.09 16:33:33 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.02.09 16:33:33 - Ready
. 2016.02.09 16:33:34 - Systems & servers data update completed
I 2016.02.09 16:33:44 - Session starting.
I 2016.02.09 16:33:44 - IPv6 disabled.
I 2016.02.09 16:33:44 - Checking authorization ...
! 2016.02.09 16:33:44 - Connecting to Cetus (Canada, Vancouver)
. 2016.02.09 16:33:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.09 16:33:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.09 16:33:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.09 16:33:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.09 16:33:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:33:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:33:44 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.02.09 16:33:44 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.09 16:33:44 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443
. 2016.02.09 16:34:16 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.02.09 16:34:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.09 16:34:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.02.09 16:34:21 - Disconnecting
. 2016.02.09 16:34:21 - Connection terminated.
I 2016.02.09 16:34:24 - Checking authorization ...
! 2016.02.09 16:34:25 - Connecting to Cetus (Canada, Vancouver)
. 2016.02.09 16:34:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.09 16:34:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.09 16:34:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.09 16:34:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.09 16:34:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:34:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:34:25 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.02.09 16:34:25 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.09 16:34:25 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443
. 2016.02.09 16:34:57 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.02.09 16:34:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.09 16:35:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.02.09 16:35:02 - Disconnecting
. 2016.02.09 16:35:02 - Connection terminated.
I 2016.02.09 16:35:05 - Checking authorization ...
! 2016.02.09 16:35:06 - Connecting to Cetus (Canada, Vancouver)
. 2016.02.09 16:35:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.09 16:35:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.09 16:35:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.09 16:35:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.09 16:35:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:35:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:35:06 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.02.09 16:35:06 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.09 16:35:06 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443
. 2016.02.09 16:35:38 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.02.09 16:35:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.09 16:35:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.02.09 16:35:43 - Disconnecting
. 2016.02.09 16:35:43 - Connection terminated.
I 2016.02.09 16:35:46 - Checking authorization ...
! 2016.02.09 16:35:47 - Connecting to Cetus (Canada, Vancouver)
. 2016.02.09 16:35:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.09 16:35:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.09 16:35:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.09 16:35:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.09 16:35:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:35:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.09 16:35:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.02.09 16:35:47 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.09 16:35:47 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443
 

Share this post


Link to post
Guest

Solved

Share this post


Link to post

Please edit your post and tell us how you solved it.

 

(Sent via Tapatalk - this generally means I'm not sitting in front of my PC)


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

I too would like to know how you solved this - I seem to be having the exact same problem: an attempt to log in with a timeout/disconnect and then another attempt to log in...

 

Thanks in advance for any insights you can provide.

Share this post


Link to post

Please, please let us know how you fixed this inactivity timeout (--ping--exit) issue.  I'm having the same problem and running out of ideas. 

 

Thanks for your help!

Share this post


Link to post

This just happened to me recently as well.  For me DHCP had somehow been disabled on my Local Area Connection which prevented Air from connecting to any server.  I went to services.msc and the DHCP client was running but I stopped it and restarted it anyway but that didn't help.   I then opened the Network Center and clicked on the red X that indicated I had a problem which then opened the Windows repair tool.  I usually just close this tool because it has never solved anything for me in 20 years but decided to let it run anyway.  Sure enough it detected that DHCP was disabled on Local Area Connection and it reenabled it.  I'm not sure what it did exactly to reenable it or how it got disabled in the first place but if you can get the Windows repair tool opened give that a quick try.

Share this post


Link to post

I have the same issue, I can't connect to any server for the whole day.

Tried with pfsense router and Eddie.

When I am not the only one it seems to be an issue with the Air Network at the moment?

this happend before but only a short period of time. This time it takes hours...

Share this post


Link to post

When I am not the only one it seems to be an issue with the Air Network at the moment?

 

For such a claim you need to prove that at least 75% of all users can't connect to any server. This is clearly not the case.

Also: Don't refer to the OP. Either do your own search or post us logs, without them we cannot identify your issue. Even if you say "I get the same error as OP" the answers for your issue might be more clear in your own logs than in OP's case.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Help please

 

 

I 2016.02.17 15:10:03 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64

. 2016.02.17 15:10:03 - Reading options from C:\Users\DB\AppData\Local\AirVPN\AirVPN.xml
. 2016.02.17 15:10:04 - Data Path: C:\Users\DB\AppData\Local\AirVPN
. 2016.02.17 15:10:04 - App Path: C:\Program Files\AirVPN
. 2016.02.17 15:10:04 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.02.17 15:10:04 - Command line arguments (1): path="home"
. 2016.02.17 15:10:04 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.02.17 15:10:04 - Updating systems & servers data ...
I 2016.02.17 15:10:05 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.02.17 15:10:05 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.02.17 15:10:05 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.02.17 15:10:05 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.02.17 15:10:05 - Session starting.
I 2016.02.17 15:10:05 - IPv6 disabled.
I 2016.02.17 15:10:05 - Checking authorization ...
. 2016.02.17 15:10:05 - Systems & servers data update completed
! 2016.02.17 15:10:06 - Connecting to Alcyone (Netherlands, Alblasserdam)
. 2016.02.17 15:10:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:10:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:10:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:10:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:10:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:10:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:10:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:10:06 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:10:06 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.116:443
. 2016.02.17 15:10:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.116:443, sid=2b12a404 64b8c72c
. 2016.02.17 15:10:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:10:06 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:10:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:10:06 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:10:06 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:10:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:10:06 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:10:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:10:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:10:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:10:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:10:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:10:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:10:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.116:443
. 2016.02.17 15:10:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:10:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.49.98 255.255.0.0'
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:10:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:10:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:10:09 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:10:09 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:10:09 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:10:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.49.98/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:10:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.49.98/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:10:09 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:10:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:10:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.116 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:10:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:10:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:10:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:10:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:10:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:10:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:10:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:10:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:10:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:10:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:10:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:10:14 - Starting Management Interface
. 2016.02.17 15:10:14 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:10:14 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:10:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:10:14 - Flushing DNS
I 2016.02.17 15:10:15 - Checking route
W 2016.02.17 15:11:05 - Timeout dell'operazione.
! 2016.02.17 15:11:05 - Disconnecting
. 2016.02.17 15:11:05 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:11:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:11:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:11:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:11:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.02.17 15:11:10 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.116 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:11:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:10 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:11:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:10 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:11:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:10 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:11:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:10 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:11:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:11:10 - Connection terminated.
I 2016.02.17 15:11:10 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:11:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:11:10 - Cancel requested.
I 2016.02.17 15:11:10 - IPv6 restored.
! 2016.02.17 15:11:10 - Session terminated.
I 2016.02.17 15:11:20 - Session starting.
I 2016.02.17 15:11:20 - IPv6 disabled.
I 2016.02.17 15:11:20 - Checking authorization ...
! 2016.02.17 15:11:21 - Connecting to Seginus (Germany, Frankfurt)
. 2016.02.17 15:11:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:11:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:11:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:11:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:11:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:11:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:11:21 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:11:21 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:11:21 - OpenVPN > UDPv4 link remote: [AF_INET]178.162.198.103:443
. 2016.02.17 15:11:21 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.198.103:443, sid=0f0a1baf 3f4efda5
. 2016.02.17 15:11:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:11:21 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:11:21 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:11:21 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:11:21 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:11:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:11:21 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:11:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:11:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:11:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:11:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:11:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:11:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:11:22 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]178.162.198.103:443
. 2016.02.17 15:11:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:11:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.239 255.255.0.0'
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:11:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:11:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:11:24 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:11:24 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:11:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:11:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.239/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:11:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.239/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:11:24 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:11:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:11:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 178.162.198.103 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:11:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:11:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:11:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:11:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:11:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:11:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:11:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:11:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:11:29 - Starting Management Interface
. 2016.02.17 15:11:29 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:11:29 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:11:30 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:11:30 - Flushing DNS
I 2016.02.17 15:11:30 - Checking route
W 2016.02.17 15:12:20 - Timeout dell'operazione.
! 2016.02.17 15:12:20 - Disconnecting
. 2016.02.17 15:12:20 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:12:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:12:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:12:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:12:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 178.162.198.103 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:12:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:12:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:12:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:12:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:25 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:12:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:12:25 - Connection terminated.
I 2016.02.17 15:12:25 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:12:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:12:28 - Checking authorization ...
! 2016.02.17 15:12:28 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.17 15:12:28 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:12:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:12:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:12:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:12:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:12:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:12:28 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:12:28 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:12:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443
. 2016.02.17 15:12:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=9696a8c7 f43ab5e8
. 2016.02.17 15:12:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:12:29 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:12:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:12:29 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:12:29 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:12:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:12:29 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:12:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:12:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:12:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:12:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:12:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:12:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:12:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443
. 2016.02.17 15:12:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:12:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.244 255.255.0.0'
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:12:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:12:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:12:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:12:31 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:12:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:12:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.244/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:12:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.244/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:12:31 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:12:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:12:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.180 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:12:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:12:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:12:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:12:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:12:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:12:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:12:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:12:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:12:36 - Starting Management Interface
. 2016.02.17 15:12:36 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:12:36 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:12:36 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:12:36 - Flushing DNS
I 2016.02.17 15:12:36 - Checking route
W 2016.02.17 15:13:26 - Timeout dell'operazione.
! 2016.02.17 15:13:26 - Disconnecting
. 2016.02.17 15:13:26 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:13:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:13:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:13:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:13:26 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.02.17 15:13:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.180 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:13:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:13:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:13:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:13:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:31 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:13:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:13:31 - Connection terminated.
I 2016.02.17 15:13:31 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:13:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:13:34 - Checking authorization ...
! 2016.02.17 15:13:34 - Connecting to Anser (Netherlands, Alblasserdam)
. 2016.02.17 15:13:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:13:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:13:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:13:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:13:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:13:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:13:34 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:13:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:13:34 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.103.169:443
. 2016.02.17 15:13:34 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.103.169:443, sid=216daf18 5e88c021
. 2016.02.17 15:13:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:13:35 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:13:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:13:35 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:13:35 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:13:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:13:35 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:13:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:13:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:13:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:13:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:13:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:13:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:13:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.103.169:443
. 2016.02.17 15:13:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:13:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.130 255.255.0.0'
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:13:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:13:40 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:13:40 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:13:40 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:13:40 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:13:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.130/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:13:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.130/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:13:40 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:13:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:13:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.103.169 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:13:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:13:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:13:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:13:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:13:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:13:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:13:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:13:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:13:45 - Starting Management Interface
. 2016.02.17 15:13:45 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:13:45 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:13:45 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:13:46 - Flushing DNS
I 2016.02.17 15:13:46 - Checking route
W 2016.02.17 15:14:36 - Timeout dell'operazione.
! 2016.02.17 15:14:36 - Disconnecting
. 2016.02.17 15:14:36 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:14:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:14:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:14:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:14:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.02.17 15:14:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.103.169 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:14:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:14:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:14:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:14:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:41 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:14:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:14:41 - Connection terminated.
I 2016.02.17 15:14:41 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:14:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:14:44 - Checking authorization ...
! 2016.02.17 15:14:44 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.17 15:14:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:14:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:14:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:14:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:14:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:14:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:14:44 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:14:44 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:14:44 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443
. 2016.02.17 15:14:44 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=069ed62c 3bc50997
. 2016.02.17 15:14:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:14:44 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:14:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:14:44 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:14:44 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:14:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:14:44 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:14:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:14:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:14:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:14:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:14:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:14:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:14:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443
. 2016.02.17 15:14:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:14:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.244 255.255.0.0'
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:14:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:14:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:14:52 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:14:52 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:14:52 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:14:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.244/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:14:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.244/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:14:52 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:14:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:14:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.180 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:14:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:14:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:14:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:14:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:14:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:14:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:14:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:14:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:14:57 - Starting Management Interface
. 2016.02.17 15:14:57 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:14:57 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:14:57 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:14:57 - Flushing DNS
I 2016.02.17 15:14:57 - Checking route
W 2016.02.17 15:15:47 - Timeout dell'operazione.
! 2016.02.17 15:15:47 - Disconnecting
. 2016.02.17 15:15:47 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:15:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:15:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:15:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:15:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.180 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:15:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:15:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:15:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:15:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:15:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:15:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:15:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:15:52 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:15:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:15:52 - Connection terminated.
I 2016.02.17 15:15:52 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:15:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:15:55 - Checking authorization ...
! 2016.02.17 15:15:56 - Connecting to Kitalpha (Switzerland, Zurich)
. 2016.02.17 15:15:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.17 15:15:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.17 15:15:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.17 15:15:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.17 15:15:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:15:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:15:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.17 15:15:56 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.17 15:15:56 - OpenVPN > UDPv4 link remote: [AF_INET]91.214.169.68:443
. 2016.02.17 15:15:56 - OpenVPN > TLS: Initial packet from [AF_INET]91.214.169.68:443, sid=a9f21201 02de8a34
. 2016.02.17 15:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.17 15:15:56 - OpenVPN > Validating certificate key usage
. 2016.02.17 15:15:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.17 15:15:56 - OpenVPN > VERIFY KU OK
. 2016.02.17 15:15:56 - OpenVPN > Validating certificate extended key usage
. 2016.02.17 15:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.17 15:15:56 - OpenVPN > VERIFY EKU OK
. 2016.02.17 15:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.17 15:15:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:15:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:15:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.17 15:15:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.17 15:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.17 15:15:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]91.214.169.68:443
. 2016.02.17 15:15:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.17 15:15:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.10 255.255.0.0'
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.17 15:15:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.17 15:15:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.17 15:15:59 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.17 15:15:59 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}.tap
. 2016.02.17 15:15:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.17 15:15:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.17.10/255.255.0.0 [sUCCEEDED]
. 2016.02.17 15:15:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.17.10/255.255.0.0 on interface {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.17 15:15:59 - OpenVPN > Successful ARP Flush on interface [22] {E8F9E8D3-998B-466F-A46C-2454A0B6DCFC}
. 2016.02.17 15:16:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.17 15:16:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 91.214.169.68 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:16:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:16:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 17
. 2016.02.17 15:16:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:16:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:16:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:16:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:16:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.17 15:16:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:04 - Starting Management Interface
. 2016.02.17 15:16:04 - OpenVPN > Initialization Sequence Completed
I 2016.02.17 15:16:04 - DNS of a network adapter forced (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:16:04 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.17 15:16:04 - Flushing DNS
I 2016.02.17 15:16:04 - Checking route
W 2016.02.17 15:16:54 - Timeout dell'operazione.
! 2016.02.17 15:16:54 - Disconnecting
. 2016.02.17 15:16:54 - Management - Send 'signal SIGTERM'
. 2016.02.17 15:16:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.17 15:16:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.17 15:16:54 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.17 15:16:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 91.214.169.68 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:16:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.02.17 15:16:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:16:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.17 15:16:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.17 15:16:59 - OpenVPN > Closing TUN/TAP interface
. 2016.02.17 15:16:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.17 15:16:59 - Connection terminated.
I 2016.02.17 15:16:59 - DNS of a network adapter restored to original settings (Intel® Centrino® Advanced-N 6205)
I 2016.02.17 15:16:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.17 15:17:01 - Cancel requested.
I 2016.02.17 15:17:01 - IPv6 restored.
! 2016.02.17 15:17:01 - Session terminated.

Share this post


Link to post

A new and inexperienced user also in need of help, please:

 

. 2016.02.28 13:22:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:22:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:22:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:22:21 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:22:21 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:22:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:22:21 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:22:21 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:22:21 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:22:21 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:22:21 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:22:21 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:22:21 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:22:21 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:21 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:21 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:21 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:21 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:21 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:21 - Starting Management Interface
. 2016.02.28 13:22:21 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:22:21 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:22:21 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:22:21 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:22:21 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:22:21 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:22:21 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:22:22 - Flushing DNS
I 2016.02.28 13:22:22 - Checking route
E 2016.02.28 13:22:22 - Routing checking failed.
. 2016.02.28 13:22:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:22:22 - Disconnecting
. 2016.02.28 13:22:22 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:22:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:22:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:22:22 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:22:27 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:27 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:27 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:27 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:27 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:27 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:27 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:22:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:22:27 - Connection terminated.
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:22:27 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:22:30 - Checking authorization ...
! 2016.02.28 13:22:31 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:22:31 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:22:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:22:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:22:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:22:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:31 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:22:31 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:22:31 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:31 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=7580fdfb 159b261d
. 2016.02.28 13:22:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:22:31 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:22:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:22:31 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:22:31 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:22:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:22:31 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:22:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:22:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:22:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:22:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:22:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:22:34 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:22:34 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:22:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:22:34 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:22:34 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:22:34 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:22:34 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:22:34 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:22:34 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:22:34 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:22:34 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:34 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:34 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:34 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:34 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:34 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:34 - Starting Management Interface
. 2016.02.28 13:22:34 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:22:34 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:22:34 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:22:34 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:22:34 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:22:34 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:22:34 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:22:35 - Flushing DNS
I 2016.02.28 13:22:35 - Checking route
E 2016.02.28 13:22:35 - Routing checking failed.
. 2016.02.28 13:22:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:22:35 - Disconnecting
. 2016.02.28 13:22:35 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:22:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:22:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:22:35 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:22:40 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:40 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:40 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:22:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:22:40 - Connection terminated.
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:22:40 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:22:43 - Checking authorization ...
! 2016.02.28 13:22:43 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:22:43 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:22:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:22:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:22:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:22:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:43 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:22:43 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:22:43 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:44 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=99b19244 aade1ce6
. 2016.02.28 13:22:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:22:44 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:22:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:22:44 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:22:44 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:22:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:22:44 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:22:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:22:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:22:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:22:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:22:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:22:47 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:22:47 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:22:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:22:47 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:22:47 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:22:47 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:22:47 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:22:47 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:22:47 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:22:47 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:22:47 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:47 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:47 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:47 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:47 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:47 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:47 - Starting Management Interface
. 2016.02.28 13:22:47 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:22:47 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:22:47 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:22:47 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:22:47 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:22:47 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:22:47 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:22:47 - Flushing DNS
I 2016.02.28 13:22:47 - Checking route
E 2016.02.28 13:22:48 - Routing checking failed.
. 2016.02.28 13:22:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:22:48 - Disconnecting
. 2016.02.28 13:22:48 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:22:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:22:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:22:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:22:53 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:22:53 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:22:53 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:53 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:53 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:22:53 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:22:53 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:22:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:22:53 - Connection terminated.
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:22:53 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:22:56 - Checking authorization ...
! 2016.02.28 13:22:57 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:22:57 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:22:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:22:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:22:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:22:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:57 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:22:57 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:22:57 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:22:57 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=ca048d87 8deb2dde
. 2016.02.28 13:22:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:22:57 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:22:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:22:57 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:22:57 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:22:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:22:57 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:22:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:22:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:22:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:22:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:22:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:23:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:23:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:23:00 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:23:00 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:23:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:23:00 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:23:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:23:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:23:00 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:23:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:23:00 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:23:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:23:00 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:00 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:00 - Starting Management Interface
. 2016.02.28 13:23:00 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:23:00 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:23:00 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:23:00 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:23:00 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:23:00 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:23:01 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:23:01 - Flushing DNS
I 2016.02.28 13:23:01 - Checking route
E 2016.02.28 13:23:01 - Routing checking failed.
. 2016.02.28 13:23:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:23:01 - Disconnecting
. 2016.02.28 13:23:01 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:23:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:23:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:23:01 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:23:06 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:06 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:06 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:06 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:06 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:06 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:06 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:23:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:23:06 - Connection terminated.
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:23:06 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:23:09 - Checking authorization ...
! 2016.02.28 13:23:10 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:23:10 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:23:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:23:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:23:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:23:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:10 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:23:10 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:23:10 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:10 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=e0fa2a40 873fd450
. 2016.02.28 13:23:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:23:10 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:23:10 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:23:10 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:23:10 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:23:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:23:10 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:23:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:23:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:23:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:23:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:23:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:23:13 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:23:13 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:23:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:23:13 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:23:13 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:23:13 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:23:13 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:23:13 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:23:13 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:23:13 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:23:13 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:13 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:13 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:13 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:13 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:13 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:13 - Starting Management Interface
. 2016.02.28 13:23:13 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:23:13 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:23:13 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:23:13 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:23:13 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:23:13 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:23:13 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:23:13 - Flushing DNS
I 2016.02.28 13:23:13 - Checking route
E 2016.02.28 13:23:14 - Routing checking failed.
. 2016.02.28 13:23:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:23:14 - Disconnecting
. 2016.02.28 13:23:14 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:23:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:23:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:23:14 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:23:19 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:19 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:19 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:19 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:19 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:19 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:19 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:23:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:23:19 - Connection terminated.
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:23:19 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:23:22 - Checking authorization ...
! 2016.02.28 13:23:23 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:23:23 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:23:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:23:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:23:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:23:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:23 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:23:23 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:23:23 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:23 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=9167fab6 f3e55732
. 2016.02.28 13:23:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:23:23 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:23:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:23:23 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:23:23 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:23:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:23:23 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:23:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:23:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:23:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:23:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:23:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:23:26 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:23:26 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:23:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:23:26 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:23:26 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:23:26 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:23:26 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:23:26 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:23:26 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:23:26 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:23:26 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:26 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:26 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:26 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:26 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:26 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:26 - Starting Management Interface
. 2016.02.28 13:23:26 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:23:26 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:23:26 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:23:26 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:23:26 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:23:26 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:23:27 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:23:27 - Flushing DNS
I 2016.02.28 13:23:27 - Checking route
E 2016.02.28 13:23:27 - Routing checking failed.
. 2016.02.28 13:23:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:23:27 - Disconnecting
. 2016.02.28 13:23:27 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:23:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:23:32 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:32 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:32 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:32 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:32 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:32 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:32 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:23:32 - Connection terminated.
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:23:32 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:23:36 - Checking authorization ...
! 2016.02.28 13:23:36 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:23:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:23:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:23:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:23:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:23:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:36 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:23:36 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:23:36 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:36 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=69fddd30 621e43ba
. 2016.02.28 13:23:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:23:36 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:23:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:23:36 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:23:36 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:23:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:23:36 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:23:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:23:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:23:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:23:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:23:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:23:39 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:23:39 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:23:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:23:39 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:23:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:23:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:23:39 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:23:39 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:23:39 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:23:39 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:23:39 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:39 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:39 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:39 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:39 - Starting Management Interface
. 2016.02.28 13:23:39 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:23:39 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:23:40 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:23:40 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:23:40 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:23:40 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:23:40 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:23:40 - Flushing DNS
I 2016.02.28 13:23:40 - Checking route
E 2016.02.28 13:23:40 - Routing checking failed.
. 2016.02.28 13:23:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:23:40 - Disconnecting
. 2016.02.28 13:23:40 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:23:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:23:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:23:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:23:45 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:45 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:45 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:45 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:45 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:45 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:45 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:23:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:23:45 - Connection terminated.
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:23:45 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:23:48 - Checking authorization ...
! 2016.02.28 13:23:49 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:23:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:23:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:23:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:23:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:23:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:23:49 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:23:49 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:49 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=e78f5f70 7cdf4b6f
. 2016.02.28 13:23:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:23:49 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:23:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:23:49 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:23:49 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:23:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:23:49 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:23:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:23:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:23:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:23:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:23:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:23:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:23:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:23:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:23:52 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:23:52 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:23:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:23:52 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:23:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:23:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:23:52 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:23:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:23:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:23:52 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:23:52 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:52 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:52 - Starting Management Interface
. 2016.02.28 13:23:52 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:23:52 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:23:52 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:23:52 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:23:52 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:23:53 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:23:53 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:23:53 - Flushing DNS
I 2016.02.28 13:23:53 - Checking route
E 2016.02.28 13:23:53 - Routing checking failed.
. 2016.02.28 13:23:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:23:53 - Disconnecting
. 2016.02.28 13:23:53 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:23:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:23:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:23:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:23:58 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:23:58 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:23:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:23:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:23:58 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:23:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:23:58 - Connection terminated.
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:23:58 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:24:01 - Checking authorization ...
! 2016.02.28 13:24:02 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:24:02 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:24:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:24:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:24:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:24:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:02 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:24:02 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:24:02 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:02 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=a883822f 6f92110c
. 2016.02.28 13:24:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:24:02 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:24:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:24:02 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:24:02 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:24:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:24:02 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:24:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:24:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:24:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:24:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:24:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:24:05 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:24:05 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:24:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:24:05 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:24:05 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:24:05 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:24:05 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:24:05 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:24:05 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:24:05 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:24:05 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:24:05 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:24:05 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:05 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:05 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:05 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:05 - Starting Management Interface
. 2016.02.28 13:24:05 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:24:05 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:24:05 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:24:05 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:24:05 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:24:05 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:24:05 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:24:05 - Flushing DNS
I 2016.02.28 13:24:06 - Checking route
E 2016.02.28 13:24:06 - Routing checking failed.
. 2016.02.28 13:24:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:24:06 - Disconnecting
. 2016.02.28 13:24:06 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:24:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:24:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:24:06 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:24:11 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:24:11 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:24:11 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:11 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:11 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:11 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:11 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:24:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:24:11 - Connection terminated.
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:24:11 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:24:14 - Checking authorization ...
! 2016.02.28 13:24:14 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:24:14 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:24:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:24:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:24:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:24:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:14 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:24:14 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:24:14 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:15 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=7d26fdb1 24721f53
. 2016.02.28 13:24:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:24:15 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:24:15 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:24:15 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:24:15 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:24:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:24:15 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:24:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:24:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:24:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:24:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:24:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:24:18 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:24:18 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:24:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:24:18 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:24:18 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:24:18 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:24:18 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:24:18 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:24:18 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:24:18 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:24:18 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:24:18 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:24:18 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:18 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:18 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:18 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:18 - Starting Management Interface
. 2016.02.28 13:24:18 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:24:18 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:24:18 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:24:18 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:24:18 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:24:18 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:24:19 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:24:19 - Flushing DNS
I 2016.02.28 13:24:19 - Checking route
E 2016.02.28 13:24:19 - Routing checking failed.
. 2016.02.28 13:24:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:24:19 - Disconnecting
. 2016.02.28 13:24:19 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:24:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:24:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:24:19 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:24:24 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:24:24 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:24:24 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:24 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:24 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:24 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:24 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:24:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.28 13:24:24 - Connection terminated.
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (Ethernet)
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:24:24 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:24:27 - Checking authorization ...
! 2016.02.28 13:24:28 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:24:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:24:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:24:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:24:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:24:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:24:28 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:24:28 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:28 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=5b4acfad 8854df70
. 2016.02.28 13:24:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:24:28 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:24:28 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:24:28 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:24:28 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:24:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:24:28 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:24:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:24:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:24:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:24:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:24:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:24:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:24:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:24:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:24:31 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:24:31 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:24:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:24:31 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:24:31 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:24:31 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:24:31 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:24:31 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:24:31 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:24:31 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:24:31 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:24:31 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:24:31 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:31 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:31 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:24:31 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:24:31 - Starting Management Interface
. 2016.02.28 13:24:31 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:24:31 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:24:31 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:24:31 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:24:31 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:24:32 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:24:32 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:24:32 - Flushing DNS
I 2016.02.28 13:24:32 - Checking route
W 2016.02.28 13:25:22 - The request timed out
! 2016.02.28 13:25:22 - Disconnecting
. 2016.02.28 13:25:22 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:25:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:25:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:25:22 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:25:27 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:25:27 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:25:27 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:25:27 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:27 - Connection terminated.
. 2016.02.28 13:25:27 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
I 2016.02.28 13:25:27 - DNS of a network adapter restored to original settings (Ethernet)
. 2016.02.28 13:25:27 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:27 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:25:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
I 2016.02.28 13:25:27 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:25:27 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:25:27 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:25:28 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:25:28 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:25:28 - Cancel requested.
I 2016.02.28 13:25:28 - IPv6 restored on network adapter (Ethernet)
I 2016.02.28 13:25:28 - IPv6 restored on network adapter (BlackBerry)
I 2016.02.28 13:25:29 - IPv6 restored on network adapter (BlackBerry 2)
I 2016.02.28 13:25:29 - IPv6 restored on network adapter (FireWire)
I 2016.02.28 13:25:29 - IPv6 restored on network adapter (Wi-Fi)
I 2016.02.28 13:25:29 - IPv6 restored on network adapter (Bluetooth PAN)
! 2016.02.28 13:25:29 - Session terminated.
I 2016.02.28 13:25:40 - Session starting.
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (Ethernet)
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (BlackBerry)
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (BlackBerry 2)
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (FireWire)
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.02.28 13:25:41 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.02.28 13:25:41 - Checking authorization ...
! 2016.02.28 13:25:42 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:25:42 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:25:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:25:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:25:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:25:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:42 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:25:42 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:25:42 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:25:42 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=ff435092 94559b29
. 2016.02.28 13:25:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:25:42 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:25:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:25:42 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:25:42 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:25:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:25:42 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:25:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:25:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:25:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:25:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:25:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2016.02.28 13:25:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.28 13:25:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.233 255.255.0.0'
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.28 13:25:45 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.28 13:25:45 - OpenVPN > route: writing to routing socket: File exists
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.28 13:25:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.28 13:25:45 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2016.02.28 13:25:45 - OpenVPN > Opened utun device utun1
. 2016.02.28 13:25:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.28 13:25:45 - OpenVPN > /sbin/ifconfig utun1 delete
. 2016.02.28 13:25:45 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2016.02.28 13:25:45 - OpenVPN > /sbin/ifconfig utun1 10.4.44.233 10.4.44.233 netmask 255.255.0.0 mtu 1500 up
. 2016.02.28 13:25:45 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.44.233 255.255.0.0
. 2016.02.28 13:25:45 - OpenVPN > add net 10.4.0.0: gateway 10.4.44.233: File exists
. 2016.02.28 13:25:45 - OpenVPN > /sbin/route add -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:25:45 - OpenVPN > add net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:25:45 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:25:45 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:45 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:25:45 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:45 - Starting Management Interface
. 2016.02.28 13:25:45 - OpenVPN > Initialization Sequence Completed
I 2016.02.28 13:25:46 - DNS of a network adapter forced (Ethernet)
I 2016.02.28 13:25:46 - DNS of a network adapter forced (BlackBerry)
I 2016.02.28 13:25:46 - DNS of a network adapter forced (BlackBerry 2)
I 2016.02.28 13:25:46 - DNS of a network adapter forced (FireWire)
I 2016.02.28 13:25:46 - DNS of a network adapter forced (Wi-Fi)
I 2016.02.28 13:25:46 - DNS of a network adapter forced (Bluetooth PAN)
I 2016.02.28 13:25:46 - Flushing DNS
I 2016.02.28 13:25:47 - Checking route
E 2016.02.28 13:25:47 - Routing checking failed.
. 2016.02.28 13:25:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3103
! 2016.02.28 13:25:47 - Disconnecting
. 2016.02.28 13:25:47 - Management - Send 'signal SIGTERM'
. 2016.02.28 13:25:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.28 13:25:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.28 13:25:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.28 13:25:52 - OpenVPN > /sbin/route delete -net 199.19.95.187 192.168.1.1 255.255.255.255
. 2016.02.28 13:25:52 - OpenVPN > delete net 199.19.95.187: gateway 192.168.1.1
. 2016.02.28 13:25:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:25:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2016.02.28 13:25:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2016.02.28 13:25:52 - OpenVPN > Closing TUN/TAP interface
. 2016.02.28 13:25:52 - Connection terminated.
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (Ethernet)
. 2016.02.28 13:25:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (BlackBerry)
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (BlackBerry 2)
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (FireWire)
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2016.02.28 13:25:52 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2016.02.28 13:25:55 - Checking authorization ...
! 2016.02.28 13:25:56 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2016.02.28 13:25:56 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.02.28 13:25:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.28 13:25:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103
. 2016.02.28 13:25:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.28 13:25:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:56 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]
. 2016.02.28 13:25:56 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.28 13:25:56 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443
. 2016.02.28 13:25:56 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=3e1c6a5b 5a6a6b5a
. 2016.02.28 13:25:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.28 13:25:56 - OpenVPN > Validating certificate key usage
. 2016.02.28 13:25:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.28 13:25:56 - OpenVPN > VERIFY KU OK
. 2016.02.28 13:25:56 - OpenVPN > Validating certificate extended key usage
. 2016.02.28 13:25:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.28 13:25:56 - OpenVPN > VERIFY EKU OK
. 2016.02.28 13:25:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.28 13:25:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:25:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.28 13:25:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.28 13:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.28 13:25:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...