Jump to content
Not connected, Your IP: 34.229.110.49

Recommended Posts

Hi,

Is AirVPN or the data center(YESUP and Amanah in this case e.g. Almach Grumium servers) disconnecting/breaking the connection from client to servers???

I know it is not my ISP doing it. The ISP modem is still running normally.

Cron operation or what?

And if the answer is that u have no control over this, they are ur servers...

What is going on?

Share this post


Link to post

Here are the logs....

Grumium

Fri Sep 01 21:01:10 2017 OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 20 2017
Fri Sep 01 21:01:10 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Fri Sep 01 21:01:10 2017 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
Enter Management Password:
Fri Sep 01 21:01:10 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25361
Fri Sep 01 21:01:10 2017 Need hold release from management interface, waiting...
Fri Sep 01 21:01:10 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25361
Fri Sep 01 21:01:10 2017 MANAGEMENT: CMD 'state on'
Fri Sep 01 21:01:10 2017 MANAGEMENT: CMD 'log all on'
Fri Sep 01 21:01:10 2017 MANAGEMENT: CMD 'echo all on'
Fri Sep 01 21:01:10 2017 MANAGEMENT: CMD 'hold off'
Fri Sep 01 21:01:10 2017 MANAGEMENT: CMD 'hold release'
Fri Sep 01 21:01:11 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:01:11 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:01:11 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Fri Sep 01 21:01:11 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Fri Sep 01 21:01:11 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Fri Sep 01 21:01:11 2017 MANAGEMENT: >STATE:1504317671,TCP_CONNECT,,,,,,
Fri Sep 01 21:01:12 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Fri Sep 01 21:01:12 2017 TCP_CLIENT link local: (not bound)
Fri Sep 01 21:01:12 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Fri Sep 01 21:01:12 2017 MANAGEMENT: >STATE:1504317672,WAIT,,,,,,
Fri Sep 01 21:01:14 2017 MANAGEMENT: >STATE:1504317674,AUTH,,,,,,
Fri Sep 01 21:01:14 2017 TLS: Initial packet from [AF_INET]127.0.0.1:1413, sid=5c777347 6549539b
Fri Sep 01 21:01:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 21:01:14 2017 VERIFY KU OK
Fri Sep 01 21:01:14 2017 Validating certificate extended key usage
Fri Sep 01 21:01:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 21:01:14 2017 VERIFY EKU OK
Fri Sep 01 21:01:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Sep 01 21:01:15 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Sep 01 21:01:15 2017 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1413
Fri Sep 01 21:01:16 2017 MANAGEMENT: >STATE:1504317676,GET_CONFIG,,,,,,
Fri Sep 01 21:01:16 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Sep 01 21:01:16 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.68 255.255.0.0'
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: timers and/or timeouts modified
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: compression parms modified
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: --ifconfig/up options modified
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: route options modified
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: route-related options modified
Fri Sep 01 21:01:16 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Sep 01 21:01:16 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 21:01:16 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:01:16 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 21:01:16 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:01:16 2017 interactive service msg_channel=820
Fri Sep 01 21:01:16 2017 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=9 HWADDR=e4:11:5b:5f:0e:67
Fri Sep 01 21:01:16 2017 open_tun
Fri Sep 01 21:01:16 2017 CreateFile failed on TAP device: \\.\Global\{767FFB41-E2FF-4085-BFEC-F85805CD759D}.tap
Fri Sep 01 21:01:16 2017 CreateFile failed on TAP device: \\.\Global\{BEB60C91-6457-4D9A-9A73-E685B7D21A65}.tap
Fri Sep 01 21:01:16 2017 TAP-WIN32 device [quad] opened: \\.\Global\{0298A3DF-3FE2-4869-A0DC-0A459AFE8DB5}.tap
Fri Sep 01 21:01:16 2017 TAP-Windows Driver Version 9.21
Fri Sep 01 21:01:16 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.68/255.255.0.0 [sUCCEEDED]
Fri Sep 01 21:01:16 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.68/255.255.0.0 on interface {0298A3DF-3FE2-4869-A0DC-0A459AFE8DB5} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
Fri Sep 01 21:01:16 2017 Successful ARP Flush on interface [3] {0298A3DF-3FE2-4869-A0DC-0A459AFE8DB5}
Fri Sep 01 21:01:16 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Sep 01 21:01:16 2017 MANAGEMENT: >STATE:1504317676,ASSIGN_IP,,10.50.1.68,,,,
Fri Sep 01 21:01:21 2017 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Fri Sep 01 21:01:21 2017 C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.2.1
Fri Sep 01 21:01:21 2017 Route addition via service succeeded
Fri Sep 01 21:01:21 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
Fri Sep 01 21:01:21 2017 Route addition via service succeeded
Fri Sep 01 21:01:21 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
Fri Sep 01 21:01:21 2017 Route addition via service succeeded
Fri Sep 01 21:01:21 2017 MANAGEMENT: >STATE:1504317681,ADD_ROUTES,,,,,,
Fri Sep 01 21:01:21 2017 C:\WINDOWS\system32\route.exe ADD 199.19.95.189 MASK 255.255.255.255 192.168.2.1
Fri Sep 01 21:01:21 2017 Route addition via service succeeded
Fri Sep 01 21:01:21 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Sep 01 21:01:21 2017 Initialization Sequence Completed
Fri Sep 01 21:01:21 2017 MANAGEMENT: >STATE:1504317681,CONNECTED,SUCCESS,10.50.1.68,127.0.0.1,1413,127.0.0.1,59108
Fri Sep 01 21:04:37 2017 Connection reset, restarting [-1]
Fri Sep 01 21:04:37 2017 SIGUSR1[soft,connection-reset] received, process restarting
Fri Sep 01 21:04:37 2017 MANAGEMENT: >STATE:1504317877,RECONNECTING,connection-reset,,,,,
Fri Sep 01 21:04:37 2017 Restart pause, 5 second(s)
Fri Sep 01 21:04:42 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Fri Sep 01 21:04:42 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Fri Sep 01 21:04:42 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Fri Sep 01 21:04:42 2017 MANAGEMENT: >STATE:1504317882,TCP_CONNECT,,,,,,
Fri Sep 01 21:04:42 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Fri Sep 01 21:04:42 2017 TCP_CLIENT link local: (not bound)
Fri Sep 01 21:04:42 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Fri Sep 01 21:04:42 2017 MANAGEMENT: >STATE:1504317882,WAIT,,,,,,
Fri Sep 01 21:04:42 2017 MANAGEMENT: >STATE:1504317882,AUTH,,,,,,
Fri Sep 01 21:04:42 2017 TLS: Initial packet from [AF_INET]127.0.0.1:1413, sid=0a2a934b bbd26d4a
Fri Sep 01 21:04:42 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 21:04:42 2017 VERIFY KU OK
Fri Sep 01 21:04:42 2017 Validating certificate extended key usage
Fri Sep 01 21:04:42 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 21:04:42 2017 VERIFY EKU OK
Fri Sep 01 21:04:42 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Sep 01 21:04:42 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Sep 01 21:04:42 2017 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1413
Fri Sep 01 21:04:43 2017 MANAGEMENT: >STATE:1504317883,GET_CONFIG,,,,,,
Fri Sep 01 21:04:43 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Sep 01 21:04:43 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.68 255.255.0.0'
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: timers and/or timeouts modified
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: compression parms modified
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: --ifconfig/up options modified
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: route options modified
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: route-related options modified
Fri Sep 01 21:04:43 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Sep 01 21:04:43 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 21:04:43 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:04:43 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 21:04:43 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:04:43 2017 Preserving previous TUN/TAP instance: quad
Fri Sep 01 21:04:43 2017 Initialization Sequence Completed
Fri Sep 01 21:04:43 2017 MANAGEMENT: >STATE:1504317883,CONNECTED,SUCCESS,10.50.1.68,127.0.0.1,1413,127.0.0.1,63889
Fri Sep 01 22:04:42 2017 TLS: soft reset sec=0 bytes=620547196/-1 pkts=1072344/0
Fri Sep 01 22:04:42 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 22:04:42 2017 VERIFY KU OK
Fri Sep 01 22:04:42 2017 Validating certificate extended key usage
Fri Sep 01 22:04:42 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 22:04:42 2017 VERIFY EKU OK
Fri Sep 01 22:04:42 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Sep 01 22:04:42 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 22:04:42 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 22:04:42 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 22:04:42 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 22:04:42 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Sep 01 23:04:42 2017 TLS: soft reset sec=0 bytes=177083934/-1 pkts=649419/0
Fri Sep 01 23:04:42 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 23:04:42 2017 VERIFY KU OK
Fri Sep 01 23:04:42 2017 Validating certificate extended key usage
Fri Sep 01 23:04:42 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 23:04:42 2017 VERIFY EKU OK
Fri Sep 01 23:04:42 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Sep 01 23:04:42 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 23:04:42 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 23:04:42 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Sep 01 23:04:42 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 23:04:42 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 00:04:42 2017 TLS: soft reset sec=0 bytes=573034949/-1 pkts=1133610/0
Sat Sep 02 00:04:43 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 00:04:43 2017 VERIFY KU OK
Sat Sep 02 00:04:43 2017 Validating certificate extended key usage
Sat Sep 02 00:04:43 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 00:04:43 2017 VERIFY EKU OK
Sat Sep 02 00:04:43 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 00:04:44 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 00:04:44 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 00:04:44 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 00:04:44 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 00:04:44 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 01:04:42 2017 TLS: tls_process: killed expiring key
Sat Sep 02 01:04:44 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 01:04:44 2017 VERIFY KU OK
Sat Sep 02 01:04:44 2017 Validating certificate extended key usage
Sat Sep 02 01:04:44 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 01:04:44 2017 VERIFY EKU OK
Sat Sep 02 01:04:44 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 01:04:45 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 01:04:45 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 01:04:45 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 01:04:45 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 01:04:45 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:04:43 2017 TLS: tls_process: killed expiring key
Sat Sep 02 02:04:45 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 02:04:45 2017 VERIFY KU OK
Sat Sep 02 02:04:45 2017 Validating certificate extended key usage
Sat Sep 02 02:04:45 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 02:04:45 2017 VERIFY EKU OK
Sat Sep 02 02:04:45 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 02:04:45 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:04:45 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:04:45 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:04:45 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:04:45 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:13:51 2017 Connection reset, restarting [-1]
Sat Sep 02 02:13:51 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:13:51 2017 MANAGEMENT: >STATE:1504336431,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:13:51 2017 Restart pause, 5 second(s)
Sat Sep 02 02:13:56 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:13:56 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:13:56 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:13:56 2017 MANAGEMENT: >STATE:1504336436,TCP_CONNECT,,,,,,
Sat Sep 02 02:13:56 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:13:56 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:13:56 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:13:56 2017 MANAGEMENT: >STATE:1504336436,WAIT,,,,,,
Sat Sep 02 02:13:57 2017 MANAGEMENT: >STATE:1504336437,AUTH,,,,,,
Sat Sep 02 02:13:57 2017 TLS: Initial packet from [AF_INET]127.0.0.1:1413, sid=c65c13a2 99de007b
Sat Sep 02 02:13:57 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 02:13:57 2017 VERIFY KU OK
Sat Sep 02 02:13:57 2017 Validating certificate extended key usage
Sat Sep 02 02:13:57 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 02:13:57 2017 VERIFY EKU OK
Sat Sep 02 02:13:57 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 02:13:57 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:13:57 2017 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:13:58 2017 MANAGEMENT: >STATE:1504336438,GET_CONFIG,,,,,,
Sat Sep 02 02:13:58 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sat Sep 02 02:13:58 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.68 255.255.0.0'
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: compression parms modified
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: --ifconfig/up options modified
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: route options modified
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: route-related options modified
Sat Sep 02 02:13:58 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Sep 02 02:13:58 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:13:58 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:13:58 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:13:58 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:13:58 2017 Preserving previous TUN/TAP instance: quad
Sat Sep 02 02:13:58 2017 Initialization Sequence Completed
Sat Sep 02 02:13:58 2017 MANAGEMENT: >STATE:1504336438,CONNECTED,SUCCESS,10.50.1.68,127.0.0.1,1413,127.0.0.1,56485
Sat Sep 02 02:14:23 2017 Connection reset, restarting [-1]
Sat Sep 02 02:14:23 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:14:23 2017 MANAGEMENT: >STATE:1504336463,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:14:23 2017 Restart pause, 5 second(s)
Sat Sep 02 02:14:28 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:28 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:14:28 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:14:28 2017 MANAGEMENT: >STATE:1504336468,TCP_CONNECT,,,,,,
Sat Sep 02 02:14:28 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:28 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:14:28 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:28 2017 MANAGEMENT: >STATE:1504336468,WAIT,,,,,,
Sat Sep 02 02:14:38 2017 Connection reset, restarting [-1]
Sat Sep 02 02:14:38 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:14:38 2017 MANAGEMENT: >STATE:1504336478,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:14:38 2017 Restart pause, 5 second(s)
Sat Sep 02 02:14:43 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:43 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:14:43 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:14:43 2017 MANAGEMENT: >STATE:1504336483,TCP_CONNECT,,,,,,
Sat Sep 02 02:14:43 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:43 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:14:43 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:43 2017 MANAGEMENT: >STATE:1504336483,WAIT,,,,,,
Sat Sep 02 02:14:53 2017 Connection reset, restarting [-1]
Sat Sep 02 02:14:53 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:14:53 2017 MANAGEMENT: >STATE:1504336493,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:14:53 2017 Restart pause, 5 second(s)
Sat Sep 02 02:14:58 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:58 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:14:58 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:14:58 2017 MANAGEMENT: >STATE:1504336498,TCP_CONNECT,,,,,,
Sat Sep 02 02:14:58 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:58 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:14:58 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:14:58 2017 MANAGEMENT: >STATE:1504336498,WAIT,,,,,,
Sat Sep 02 02:15:08 2017 Connection reset, restarting [-1]
Sat Sep 02 02:15:08 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:15:08 2017 MANAGEMENT: >STATE:1504336508,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:15:08 2017 Restart pause, 5 second(s)
Sat Sep 02 02:15:13 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:13 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:15:13 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:15:13 2017 MANAGEMENT: >STATE:1504336513,TCP_CONNECT,,,,,,
Sat Sep 02 02:15:13 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:13 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:15:13 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:13 2017 MANAGEMENT: >STATE:1504336513,WAIT,,,,,,
Sat Sep 02 02:15:23 2017 Connection reset, restarting [-1]
Sat Sep 02 02:15:23 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:15:23 2017 MANAGEMENT: >STATE:1504336523,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:15:23 2017 Restart pause, 5 second(s)
Sat Sep 02 02:15:28 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:28 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:15:28 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:15:28 2017 MANAGEMENT: >STATE:1504336528,TCP_CONNECT,,,,,,
Sat Sep 02 02:15:28 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:28 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:15:28 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:28 2017 MANAGEMENT: >STATE:1504336528,WAIT,,,,,,
Sat Sep 02 02:15:38 2017 Connection reset, restarting [-1]
Sat Sep 02 02:15:38 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:15:38 2017 MANAGEMENT: >STATE:1504336538,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:15:38 2017 Restart pause, 5 second(s)
Sat Sep 02 02:15:43 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:43 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:15:43 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:15:43 2017 MANAGEMENT: >STATE:1504336543,TCP_CONNECT,,,,,,
Sat Sep 02 02:15:43 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:43 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:15:43 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:15:43 2017 MANAGEMENT: >STATE:1504336543,WAIT,,,,,,
Sat Sep 02 02:15:53 2017 Connection reset, restarting [-1]
Sat Sep 02 02:15:53 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:15:53 2017 MANAGEMENT: >STATE:1504336553,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:15:53 2017 Restart pause, 10 second(s)
Sat Sep 02 02:16:03 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:03 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:16:03 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:16:03 2017 MANAGEMENT: >STATE:1504336563,TCP_CONNECT,,,,,,
Sat Sep 02 02:16:03 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:03 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:16:03 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:03 2017 MANAGEMENT: >STATE:1504336563,WAIT,,,,,,
Sat Sep 02 02:16:13 2017 Connection reset, restarting [-1]
Sat Sep 02 02:16:13 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:16:13 2017 MANAGEMENT: >STATE:1504336573,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:16:13 2017 Restart pause, 20 second(s)
Sat Sep 02 02:16:33 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:33 2017 Socket Buffers: R=[65536->562144] S=[65536->562144]
Sat Sep 02 02:16:33 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Sat Sep 02 02:16:33 2017 MANAGEMENT: >STATE:1504336593,TCP_CONNECT,,,,,,
Sat Sep 02 02:16:33 2017 TCP connection established with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:33 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:16:33 2017 TCP_CLIENT link remote: [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:33 2017 MANAGEMENT: >STATE:1504336593,WAIT,,,,,,
Sat Sep 02 02:16:36 2017 MANAGEMENT: >STATE:1504336596,AUTH,,,,,,
Sat Sep 02 02:16:36 2017 TLS: Initial packet from [AF_INET]127.0.0.1:1413, sid=efde8b2e 29b04fdc
Sat Sep 02 02:16:37 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 02:16:37 2017 VERIFY KU OK
Sat Sep 02 02:16:37 2017 Validating certificate extended key usage
Sat Sep 02 02:16:37 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 02:16:37 2017 VERIFY EKU OK
Sat Sep 02 02:16:37 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 02:16:37 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:16:37 2017 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1413
Sat Sep 02 02:16:38 2017 Key [AF_INET]127.0.0.1:1413 [0] not initialized (yet), dropping packet.
Sat Sep 02 02:16:38 2017 MANAGEMENT: >STATE:1504336598,GET_CONFIG,,,,,,
Sat Sep 02 02:16:38 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sat Sep 02 02:16:38 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.68 255.255.0.0'
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: compression parms modified
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: --ifconfig/up options modified
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: route options modified
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: route-related options modified
Sat Sep 02 02:16:38 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Sep 02 02:16:38 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:16:38 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:16:38 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 02:16:38 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 02:16:38 2017 Preserving previous TUN/TAP instance: quad
Sat Sep 02 02:16:38 2017 Initialization Sequence Completed
Sat Sep 02 02:16:38 2017 MANAGEMENT: >STATE:1504336598,CONNECTED,SUCCESS,10.50.1.68,127.0.0.1,1413,127.0.0.1,56926
Sat Sep 02 03:16:37 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 03:16:37 2017 VERIFY KU OK
Sat Sep 02 03:16:37 2017 Validating certificate extended key usage
Sat Sep 02 03:16:37 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 03:16:37 2017 VERIFY EKU OK
Sat Sep 02 03:16:37 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sat Sep 02 03:16:37 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 03:16:37 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 03:16:37 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 02 03:16:37 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 02 03:16:37 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
 

Almach

Fri Sep 01 21:30:10 2017 OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 20 2017
Fri Sep 01 21:30:10 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Fri Sep 01 21:30:10 2017 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
Enter Management Password:
Fri Sep 01 21:30:10 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25369
Fri Sep 01 21:30:10 2017 Need hold release from management interface, waiting...
Fri Sep 01 21:30:10 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25369
Fri Sep 01 21:30:11 2017 MANAGEMENT: CMD 'state on'
Fri Sep 01 21:30:11 2017 MANAGEMENT: CMD 'log all on'
Fri Sep 01 21:30:11 2017 MANAGEMENT: CMD 'echo all on'
Fri Sep 01 21:30:11 2017 MANAGEMENT: CMD 'hold off'
Fri Sep 01 21:30:11 2017 MANAGEMENT: CMD 'hold release'
Fri Sep 01 21:30:11 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:30:11 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Sep 01 21:30:11 2017 MANAGEMENT: >STATE:1504319411,RESOLVE,,,,,,
Fri Sep 01 21:30:13 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.12:443
Fri Sep 01 21:30:13 2017 Socket Buffers: R=[65536->262144] S=[65536->262144]
Fri Sep 01 21:30:13 2017 Attempting to establish TCP connection with [AF_INET]199.19.94.12:443 [nonblock]
Fri Sep 01 21:30:13 2017 MANAGEMENT: >STATE:1504319413,TCP_CONNECT,,,,,,
Fri Sep 01 21:30:14 2017 TCP connection established with [AF_INET]199.19.94.12:443
Fri Sep 01 21:30:14 2017 TCP_CLIENT link local: (not bound)
Fri Sep 01 21:30:14 2017 TCP_CLIENT link remote: [AF_INET]199.19.94.12:443
Fri Sep 01 21:30:14 2017 MANAGEMENT: >STATE:1504319414,WAIT,,,,,,
Fri Sep 01 21:30:14 2017 MANAGEMENT: >STATE:1504319414,AUTH,,,,,,
Fri Sep 01 21:30:14 2017 TLS: Initial packet from [AF_INET]199.19.94.12:443, sid=fb924eee 1fc9e2a4
Fri Sep 01 21:30:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 21:30:14 2017 VERIFY KU OK
Fri Sep 01 21:30:14 2017 Validating certificate extended key usage
Fri Sep 01 21:30:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 21:30:14 2017 VERIFY EKU OK
Fri Sep 01 21:30:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Fri Sep 01 21:30:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Sep 01 21:30:14 2017 [Almach] Peer Connection Initiated with [AF_INET]199.19.94.12:443
Fri Sep 01 21:30:15 2017 MANAGEMENT: >STATE:1504319415,GET_CONFIG,,,,,,
Fri Sep 01 21:30:15 2017 SENT CONTROL [Almach]: 'PUSH_REQUEST' (status=1)
Fri Sep 01 21:30:16 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.3.77 255.255.0.0,peer-id 0,cipher AES-256-GCM'
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: timers and/or timeouts modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: compression parms modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: --ifconfig/up options modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: route options modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: route-related options modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: peer-id set
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Sep 01 21:30:16 2017 OPTIONS IMPORT: data channel crypto options modified
Fri Sep 01 21:30:16 2017 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Sep 01 21:30:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 21:30:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 21:30:16 2017 interactive service msg_channel=648
Fri Sep 01 21:30:16 2017 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=9 HWADDR=e4:11:5b:5f:0e:67
Fri Sep 01 21:30:16 2017 open_tun
Fri Sep 01 21:30:16 2017 TAP-WIN32 device [quad2] opened: \\.\Global\{767FFB41-E2FF-4085-BFEC-F85805CD759D}.tap
Fri Sep 01 21:30:16 2017 TAP-Windows Driver Version 9.21
Fri Sep 01 21:30:16 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.3.77/255.255.0.0 [sUCCEEDED]
Fri Sep 01 21:30:16 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.3.77/255.255.0.0 on interface {767FFB41-E2FF-4085-BFEC-F85805CD759D} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
Fri Sep 01 21:30:16 2017 Successful ARP Flush on interface [7] {767FFB41-E2FF-4085-BFEC-F85805CD759D}
Fri Sep 01 21:30:16 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Sep 01 21:30:16 2017 MANAGEMENT: >STATE:1504319416,ASSIGN_IP,,10.5.3.77,,,,
Fri Sep 01 21:30:21 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Fri Sep 01 21:30:21 2017 C:\WINDOWS\system32\route.exe ADD 199.19.94.12 MASK 255.255.255.255 192.168.2.1
Fri Sep 01 21:30:21 2017 Route addition via service succeeded
Fri Sep 01 21:30:21 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
Fri Sep 01 21:30:21 2017 Route addition via service succeeded
Fri Sep 01 21:30:21 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
Fri Sep 01 21:30:21 2017 Route addition via service succeeded
Fri Sep 01 21:30:21 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Sep 01 21:30:21 2017 Initialization Sequence Completed
Fri Sep 01 21:30:21 2017 MANAGEMENT: >STATE:1504319421,CONNECTED,SUCCESS,10.5.3.77,199.19.94.12,443,10.50.1.68,62375
Fri Sep 01 22:30:14 2017 TLS: soft reset sec=0 bytes=64285476/-1 pkts=457857/0
Fri Sep 01 22:30:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 22:30:14 2017 VERIFY KU OK
Fri Sep 01 22:30:14 2017 Validating certificate extended key usage
Fri Sep 01 22:30:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 22:30:14 2017 VERIFY EKU OK
Fri Sep 01 22:30:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Fri Sep 01 22:30:14 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 22:30:14 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 22:30:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Sep 01 23:30:14 2017 TLS: soft reset sec=0 bytes=73909289/-1 pkts=495658/0
Fri Sep 01 23:30:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Sep 01 23:30:14 2017 VERIFY KU OK
Fri Sep 01 23:30:14 2017 Validating certificate extended key usage
Fri Sep 01 23:30:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 01 23:30:14 2017 VERIFY EKU OK
Fri Sep 01 23:30:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Fri Sep 01 23:30:14 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 23:30:14 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Sep 01 23:30:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 00:30:14 2017 TLS: soft reset sec=0 bytes=796941327/-1 pkts=1177138/0
Sat Sep 02 00:30:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 00:30:14 2017 VERIFY KU OK
Sat Sep 02 00:30:14 2017 Validating certificate extended key usage
Sat Sep 02 00:30:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 00:30:14 2017 VERIFY EKU OK
Sat Sep 02 00:30:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Sat Sep 02 00:30:14 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 00:30:14 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 00:30:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 01:30:14 2017 TLS: soft reset sec=0 bytes=1486414583/-1 pkts=1825286/0
Sat Sep 02 01:30:14 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 01:30:14 2017 VERIFY KU OK
Sat Sep 02 01:30:14 2017 Validating certificate extended key usage
Sat Sep 02 01:30:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 01:30:14 2017 VERIFY EKU OK
Sat Sep 02 01:30:14 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Sat Sep 02 01:30:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 01:30:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 01:30:15 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:13:54 2017 read TCP_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Sat Sep 02 02:13:54 2017 Connection reset, restarting [-1]
Sat Sep 02 02:13:54 2017 SIGUSR1[soft,connection-reset] received, process restarting
Sat Sep 02 02:13:54 2017 MANAGEMENT: >STATE:1504336434,RECONNECTING,connection-reset,,,,,
Sat Sep 02 02:13:54 2017 Restart pause, 5 second(s)
Sat Sep 02 02:13:59 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.12:443
Sat Sep 02 02:13:59 2017 Socket Buffers: R=[65536->262144] S=[65536->262144]
Sat Sep 02 02:13:59 2017 Attempting to establish TCP connection with [AF_INET]199.19.94.12:443 [nonblock]
Sat Sep 02 02:13:59 2017 MANAGEMENT: >STATE:1504336439,TCP_CONNECT,,,,,,
Sat Sep 02 02:15:59 2017 TCP: connect to [AF_INET]199.19.94.12:443 failed: Connection timed out (WSAETIMEDOUT)
Sat Sep 02 02:15:59 2017 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Sat Sep 02 02:15:59 2017 MANAGEMENT: >STATE:1504336559,RECONNECTING,init_instance,,,,,
Sat Sep 02 02:15:59 2017 Restart pause, 5 second(s)
Sat Sep 02 02:16:04 2017 MANAGEMENT: >STATE:1504336564,RESOLVE,,,,,,
Sat Sep 02 02:16:16 2017 RESOLVE: Cannot resolve host address: almach.airvpn.org:443 (No such host is known. )
Sat Sep 02 02:16:16 2017 MANAGEMENT: >STATE:1504336576,RESOLVE,,,,,,
Sat Sep 02 02:16:28 2017 RESOLVE: Cannot resolve host address: almach.airvpn.org:443 (No such host is known. )
Sat Sep 02 02:16:28 2017 Could not determine IPv4/IPv6 protocol
Sat Sep 02 02:16:28 2017 SIGUSR1[soft,init_instance] received, process restarting
Sat Sep 02 02:16:28 2017 MANAGEMENT: >STATE:1504336588,RECONNECTING,init_instance,,,,,
Sat Sep 02 02:16:28 2017 Restart pause, 5 second(s)
Sat Sep 02 02:16:33 2017 MANAGEMENT: >STATE:1504336593,RESOLVE,,,,,,
Sat Sep 02 02:16:41 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.12:443
Sat Sep 02 02:16:41 2017 Socket Buffers: R=[65536->262144] S=[65536->262144]
Sat Sep 02 02:16:41 2017 Attempting to establish TCP connection with [AF_INET]199.19.94.12:443 [nonblock]
Sat Sep 02 02:16:41 2017 MANAGEMENT: >STATE:1504336601,TCP_CONNECT,,,,,,
Sat Sep 02 02:16:42 2017 TCP connection established with [AF_INET]199.19.94.12:443
Sat Sep 02 02:16:42 2017 TCP_CLIENT link local: (not bound)
Sat Sep 02 02:16:42 2017 TCP_CLIENT link remote: [AF_INET]199.19.94.12:443
Sat Sep 02 02:16:42 2017 MANAGEMENT: >STATE:1504336602,WAIT,,,,,,
Sat Sep 02 02:16:42 2017 MANAGEMENT: >STATE:1504336602,AUTH,,,,,,
Sat Sep 02 02:16:42 2017 TLS: Initial packet from [AF_INET]199.19.94.12:443, sid=a4b4c908 7064d652
Sat Sep 02 02:16:42 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 02:16:42 2017 VERIFY KU OK
Sat Sep 02 02:16:42 2017 Validating certificate extended key usage
Sat Sep 02 02:16:42 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 02:16:42 2017 VERIFY EKU OK
Sat Sep 02 02:16:42 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Sat Sep 02 02:16:43 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 02 02:16:43 2017 [Almach] Peer Connection Initiated with [AF_INET]199.19.94.12:443
Sat Sep 02 02:16:44 2017 MANAGEMENT: >STATE:1504336604,GET_CONFIG,,,,,,
Sat Sep 02 02:16:44 2017 SENT CONTROL [Almach]: 'PUSH_REQUEST' (status=1)
Sat Sep 02 02:16:45 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.3.77 255.255.0.0,peer-id 0,cipher AES-256-GCM'
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: compression parms modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: --ifconfig/up options modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: route options modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: route-related options modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: peer-id set
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: adjusting link_mtu to 1627
Sat Sep 02 02:16:45 2017 OPTIONS IMPORT: data channel crypto options modified
Sat Sep 02 02:16:45 2017 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Sep 02 02:16:45 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 02:16:45 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 02:16:45 2017 Preserving previous TUN/TAP instance: quad2
Sat Sep 02 02:16:45 2017 Initialization Sequence Completed
Sat Sep 02 02:16:45 2017 MANAGEMENT: >STATE:1504336605,CONNECTED,SUCCESS,10.5.3.77,199.19.94.12,443,192.168.2.153,56959
Sat Sep 02 03:16:43 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Sep 02 03:16:43 2017 VERIFY KU OK
Sat Sep 02 03:16:43 2017 Validating certificate extended key usage
Sat Sep 02 03:16:43 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 02 03:16:43 2017 VERIFY EKU OK
Sat Sep 02 03:16:43 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Almach, emailAddress=info@airvpn.org
Sat Sep 02 03:16:43 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 03:16:43 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 02 03:16:43 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...