Jump to content


Photo

Unable to connect after Windows 10 update

DNS Windows 10 Update

  • Please log in to reply
2 replies to this topic

#1 mastermoogle

mastermoogle

    Newbie

  • New Members
  • Pip
  • 1 posts

Posted 07 December 2016 - 05:04 AM

Just installed the most recent Windows 10 update, been looking around the site but haven't found a definitive solution. I keep disconnecting as it is checking the route, I've tried unchecking "Check if the tunnel uses AirVPN DNS", but that results in a faulty connection. 

Logs: 

I 2016.12.06 23:38:00 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.12.06 23:38:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2016.12.06 23:38:00 - Data Path: C:\Program Files\AirVPN
. 2016.12.06 23:38:00 - App Path: C:\Program Files\AirVPN
. 2016.12.06 23:38:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.06 23:38:00 - Command line arguments (0):
. 2016.12.06 23:38:00 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.12.06 23:38:00 - Updating systems & servers data ...
I 2016.12.06 23:38:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.12.06 23:38:00 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.06 23:38:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.06 23:38:00 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.06 23:38:00 - Ready
. 2016.12.06 23:38:01 - Systems & servers data update completed
I 2016.12.06 23:38:02 - Session starting.
I 2016.12.06 23:38:02 - IPv6 disabled.
I 2016.12.06 23:38:08 - Checking authorization ...
! 2016.12.06 23:38:09 - Connecting to Cursa (United States, Miami)
. 2016.12.06 23:38:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:38:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:38:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:38:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:38:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:38:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:38:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:38:09 - OpenVPN > UDPv4 link remote: [AF_INET]96.47.229.58:443
. 2016.12.06 23:38:09 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.58:443, sid=66b5f82a a1377c50
. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:38:09 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:38:09 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:38:09 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:38:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:38:09 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:38:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:38:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:38:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:38:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:38:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.58:443
. 2016.12.06 23:38:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:38:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.21 255.255.0.0'
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:38:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:38:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:38:11 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:38:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:38:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:38:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.21/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:38:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.21/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:38:11 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:38:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.58 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:38:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:38:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:16 - Starting Management Interface
. 2016.12.06 23:38:16 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:38:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:38:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:38:16 - Flushing DNS
I 2016.12.06 23:38:16 - Checking route
W 2016.12.06 23:38:40 - The remote name could not be resolved: 'cursa_exit.airservers.org'
! 2016.12.06 23:38:40 - Disconnecting
. 2016.12.06 23:38:40 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:38:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:38:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:38:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.58 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:38:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:38:45 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:38:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:38:45 - Connection terminated.
I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:38:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:38:48 - Cancel requested.
I 2016.12.06 23:38:48 - IPv6 restored.
! 2016.12.06 23:38:48 - Session terminated.
I 2016.12.06 23:43:24 - Session starting.
I 2016.12.06 23:43:24 - IPv6 disabled.
I 2016.12.06 23:43:25 - Checking authorization ...
! 2016.12.06 23:43:25 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:43:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:43:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:43:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:43:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:43:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:43:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:43:25 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:43:25 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:43:25 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=6c854023 923066a3
. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:43:25 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:43:25 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:43:25 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:43:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:43:25 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:43:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:43:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:43:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:43:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:43:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:43:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:43:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:43:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:43:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:43:28 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:43:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:43:28 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:43:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:43:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:43:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:43:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:43:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:43:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:43:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:43:33 - Starting Management Interface
. 2016.12.06 23:43:33 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:43:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:43:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:43:33 - Flushing DNS
I 2016.12.06 23:43:33 - Checking DNS
W 2016.12.06 23:43:57 - The remote name could not be resolved: 'acamar_exit.airservers.org'
! 2016.12.06 23:43:57 - Disconnecting
. 2016.12.06 23:43:57 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:43:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.06 23:43:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:43:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:44:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:44:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:44:02 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:44:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:44:02 - Connection terminated.
I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:44:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:44:05 - Cancel requested.
I 2016.12.06 23:44:05 - IPv6 restored.
! 2016.12.06 23:44:05 - Session terminated.
I 2016.12.06 23:50:11 - Session starting.
I 2016.12.06 23:50:11 - IPv6 disabled.
I 2016.12.06 23:50:11 - Checking authorization ...
! 2016.12.06 23:50:11 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:50:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:50:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:50:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:50:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:50:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:50:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:50:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:50:11 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:50:11 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=b96b8d3e 113c910e
. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:50:11 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:50:11 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:50:11 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:50:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:50:11 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:50:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:50:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:50:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:50:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:50:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:50:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:50:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:50:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:50:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:50:14 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:50:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:50:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:50:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:50:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:50:14 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:50:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:50:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:50:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:19 - Starting Management Interface
. 2016.12.06 23:50:19 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:50:19 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:50:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:50:19 - Flushing DNS
I 2016.12.06 23:50:19 - Checking DNS
W 2016.12.06 23:50:43 - The remote name could not be resolved: 'acamar_exit.airservers.org'
! 2016.12.06 23:50:44 - Disconnecting
. 2016.12.06 23:50:44 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:50:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.06 23:50:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:50:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:50:49 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:50:49 - Connection terminated.
I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:50:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:50:49 - Cancel requested.
I 2016.12.06 23:50:49 - IPv6 restored.
! 2016.12.06 23:50:49 - Session terminated.
I 2016.12.06 23:52:25 - Session starting.
I 2016.12.06 23:52:25 - IPv6 disabled.
I 2016.12.06 23:52:25 - Checking authorization ...
! 2016.12.06 23:52:25 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:52:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:52:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:52:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:52:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:52:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:52:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:52:26 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:52:26 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:52:26 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=061a5617 c2c9cd1f
. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:52:26 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:52:26 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:52:26 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:52:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:52:26 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:52:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:52:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:52:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:52:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:52:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:52:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:52:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:52:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:52:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:52:28 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:52:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:52:28 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:52:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:52:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:52:28 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:52:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:52:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:52:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:52:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:52:33 - Starting Management Interface
. 2016.12.06 23:52:33 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:52:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:52:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:52:33 - Flushing DNS
! 2016.12.06 23:52:33 - Connected.
. 2016.12.06 23:52:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.06 23:52:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.12.06 23:53:30 - Disconnecting
. 2016.12.06 23:53:30 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:53:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:53:30 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:53:35 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:53:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:53:35 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:53:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:53:35 - Connection terminated.
I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:53:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:53:35 - IPv6 restored.
! 2016.12.06 23:53:35 - Session terminated.
I 2016.12.06 23:57:04 - Session starting.
I 2016.12.06 23:57:04 - IPv6 disabled.
I 2016.12.06 23:57:04 - Checking authorization ...
! 2016.12.06 23:57:04 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:57:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:57:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:57:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:57:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:57:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:57:04 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:57:04 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=3144bc70 76c93ca4
. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:57:05 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:57:05 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:57:05 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:57:05 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:57:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:57:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:57:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:57:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:57:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:57:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:57:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:57:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:57:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:57:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:57:07 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:57:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:57:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:12 - Starting Management Interface
. 2016.12.06 23:57:12 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:57:12 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:57:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:57:12 - Flushing DNS
! 2016.12.06 23:57:12 - Connected.
. 2016.12.06 23:57:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.06 23:57:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.12.06 23:57:36 - Disconnecting
. 2016.12.06 23:57:36 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:57:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:57:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:41 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:57:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:57:41 - Connection terminated.
I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:57:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:57:44 - Checking authorization ...
! 2016.12.06 23:57:44 - Connecting to Yildun (United States, Miami)
. 2016.12.06 23:57:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:57:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:57:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:57:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:57:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:57:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443
. 2016.12.06 23:57:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=2c89d04c abcce70e
. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:57:44 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:57:44 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:57:44 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:57:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:57:44 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:57:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:57:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:57:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:57:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443
. 2016.12.06 23:57:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:57:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.64 255.255.0.0'
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:57:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:57:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:57:47 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:57:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:57:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.64/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.64/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:57:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:57:52 - Starting Management Interface
. 2016.12.06 23:57:52 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:57:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:57:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:57:52 - Flushing DNS
! 2016.12.06 23:57:52 - Connected.
. 2016.12.06 23:57:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.06 23:57:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.12.06 23:58:03 - Disconnecting
. 2016.12.06 23:58:03 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:58:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:58:03 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:08 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:58:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:58:08 - Connection terminated.
I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:58:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:58:08 - IPv6 restored.
! 2016.12.06 23:58:08 - Session terminated.
I 2016.12.06 23:58:09 - Session starting.
I 2016.12.06 23:58:09 - IPv6 disabled.
I 2016.12.06 23:58:09 - Checking authorization ...
! 2016.12.06 23:58:09 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:58:09 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:58:09 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=8e90e690 ea17a30b
. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:58:09 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:58:09 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:58:09 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:58:09 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:58:12 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:58:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:58:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:58:12 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:58:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:17 - Starting Management Interface
. 2016.12.06 23:58:17 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:58:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:58:17 - Flushing DNS
! 2016.12.06 23:58:17 - Connected.
. 2016.12.06 23:58:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.06 23:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.12.06 23:58:32 - Disconnecting
. 2016.12.06 23:58:32 - Management - Send 'signal SIGTERM'
. 2016.12.06 23:58:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.06 23:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:58:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.06 23:58:37 - OpenVPN > Closing TUN/TAP interface
. 2016.12.06 23:58:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.06 23:58:37 - Connection terminated.
I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:58:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.06 23:58:37 - IPv6 restored.
! 2016.12.06 23:58:37 - Session terminated.
I 2016.12.06 23:59:43 - Session starting.
I 2016.12.06 23:59:43 - IPv6 disabled.
I 2016.12.06 23:59:43 - Checking authorization ...
! 2016.12.06 23:59:44 - Connecting to Acamar (United States, Miami)
. 2016.12.06 23:59:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.12.06 23:59:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.06 23:59:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.06 23:59:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.06 23:59:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:59:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:59:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.06 23:59:44 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.154:443
. 2016.12.06 23:59:44 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.154:443, sid=cdf0a51f fc693d36
. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.06 23:59:44 - OpenVPN > Validating certificate key usage
. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.06 23:59:44 - OpenVPN > VERIFY KU OK
. 2016.12.06 23:59:44 - OpenVPN > Validating certificate extended key usage
. 2016.12.06 23:59:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.06 23:59:44 - OpenVPN > VERIFY EKU OK
. 2016.12.06 23:59:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:59:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.06 23:59:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.06 23:59:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.06 23:59:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.154:443
. 2016.12.06 23:59:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.06 23:59:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.56.164 255.255.0.0'
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.06 23:59:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.06 23:59:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.06 23:59:47 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.06 23:59:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C51200F7-B47E-41E9-B393-9151E759ECBE}.tap
. 2016.12.06 23:59:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.06 23:59:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.56.164/255.255.0.0 [SUCCEEDED]
. 2016.12.06 23:59:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.164/255.255.0.0 on interface {C51200F7-B47E-41E9-B393-9151E759ECBE} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.06 23:59:47 - OpenVPN > Successful ARP Flush on interface [13] {C51200F7-B47E-41E9-B393-9151E759ECBE}
. 2016.12.06 23:59:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 16
. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:59:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.06 23:59:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.06 23:59:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.06 23:59:52 - Starting Management Interface
. 2016.12.06 23:59:52 - OpenVPN > Initialization Sequence Completed
I 2016.12.06 23:59:52 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.12.06 23:59:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.06 23:59:52 - Flushing DNS
! 2016.12.06 23:59:52 - Connected.
. 2016.12.06 23:59:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.06 23:59:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.12.07 00:00:12 - Disconnecting
. 2016.12.07 00:00:12 - Management - Send 'signal SIGTERM'
. 2016.12.07 00:00:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.07 00:00:12 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.44.55.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.07 00:00:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.07 00:00:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.07 00:00:17 - OpenVPN > Closing TUN/TAP interface
. 2016.12.07 00:00:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.07 00:00:17 - Connection terminated.
I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.12.07 00:00:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.07 00:00:17 - IPv6 restored.
! 2016.12.07 00:00:17 - Session terminated.
 
If I could get some advice on how to fix this issue it would be much appreciated!


#2 LZ1

LZ1

    It's nice to be nice to nice people

  • Moderators
  • 1837 posts

Posted 07 December 2016 - 01:13 PM

Hello!

 

There's 2 of such "check tunnel" options. One is for DNS, another for the tunnel itself - try to look for it and disable both :). Beyond that, trying different protocols and server combinations can work sometimes. Alternatively, you may have more luck with the experimental client :). If you don't know where to find it, my signature guide shows where.


Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. Its Guides Section has guides on Linux/Torrenting/Blocked sites & many other topics too.
Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please read the First Questions section in the link above for more details, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Tired of Windows? Why Linux Is Better.

#3 Khariz

Khariz

    Advanced Member

  • Members
  • PipPipPip
  • 417 posts

Posted 08 December 2016 - 02:43 AM

I have no issues with the Experimental Client in Windows 10







Similar Topics Collapse


1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 14445 - BW: 56527 Mbit/sYour IP: 54.162.159.33Guest Access.