Jump to content


Photo

Slow speed (sort of)


  • Please log in to reply
4 replies to this topic

#1 Haunt

Haunt

    Newbie

  • Members
  • Pip
  • 3 posts

Posted 16 March 2018 - 11:06 AM

Hello.

 

I know this has been asked a number of times and I hate to be that guy but i'm running out of ideas and things to try.

 

Without a vpn I get 220mpbs.  With this one VPN provider I can get 199mbps using AES-256.  With AirVpn the speed ranges anywhere from 120mpbs and way below.  This is all using servers in the same country i'm in.

 

I've tried the protocols one by one,  put my router in modem mode,  tired various buffer sizes,  turned off my firewall,  and I can't seem to ever get above 120mpbs,  I know it's not a slow speed by any means and I've looked at the server info page so I know these fast speeds are achievable  but it's still quite a bit of a difference compared to the other VPN service.

 

I don't want to give up just yet as I quite like the user interface on the 'Eddie' application and all the information and options it gives you,   can anyone think of anything else I could try?  



#2 Staff

Staff

    Advanced Member

  • Staff
  • PipPipPip
  • 7796 posts

Posted 16 March 2018 - 11:24 AM

Hello,

 

please post Eddie system report ("Logs" > life belt icon > copy all > paste), it will tell us your Operating System exact version and many other settings that might help in tuning.

 

Kind regards



#3 Haunt

Haunt

    Newbie

  • Members
  • Pip
  • 3 posts

Posted 16 March 2018 - 11:38 AM

Everything has been done via a cabled LAN connection as well.  ( you probably tell anyway)  UDP 53 protocol has been the fastest for me so far.
 
 
Eddie System/Environment Report - 15/03/2018 20:57 UTC
 
Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.16299.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (D:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (D:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (D:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (D:\Program Files\AirVPN\curl.exe)
Profile path: D:\Program Files\AirVPN\AirVPN.xml
Data path: D:\Program Files\AirVPN
Application path: D:\Program Files\AirVPN
Executable path: D:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (0 args) 
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.8.0.1, 194.168.4.100, 194.168.8.100
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:
 
Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Fri, 16 Mar 2018 11:36:51 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Test HTTPS:
 
Status: HTTP/2 200 
 - Headers: server:nginx;date:Fri, 16 Mar 2018 11:36:52 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
servers.whitelist: 5e26cb294a9ad309deaf20c36b6841d87e6574a5324e3056350d06fa7de94409,20dc8ad0bdcd308532e267288a96f544097973189da6b23cf9343aed601d6b09,4d8372743530ac3f7b095f63b52f1240f1195595c4aa76ef63d01a77aafa7fb5,4a419d140de6bb51cc57b98a05e8e55b0360377d26e2fc80666a2a42702f6509,17388082e9599070763fffe8f5096959cd23e3f311ea0aa8448c01fdbe26799d,f43b39ea311b6bd9c81da7499d13c171e06dfa120c83ac2d04aaea8f98e52b7e,2f7a2594332f2669a527e669a1de0f4bf76f8243cd4c58af44f51c9fd50b9fb2,f49f4b1a23b27a0d9499a5000cc7204fda24b6c54e724cc0f42cdccec0e87faf,eb1b1573931f127e991a7cd60ed29c14133dfc19ef4efd304130d936fc58024a,a0dc65ec7d0eae3d122aa4c626c3255d8880b922fe97937e0218b7054f62508d
servers.blacklist: 0c499ba24c0f0a5054319c7c1375746d0213cdd662573440d7612e87b564147f
servers.locklast: True
areas.whitelist: es,nl,se
mode.protocol: UDP
mode.port: 53
ipv6.mode: none
openvpn.sndbuf: 524288
openvpn.rcvbuf: 524288
pinger.enabled: False
 
----------------------------
Logs:
 
. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:50:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:50:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:50:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:50:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:50:31 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:50:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:50:31 - OpenVPN > open_tun
. 2018.03.15 20:50:31 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:50:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:50:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.189/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:50:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.189/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.15 20:50:31 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:50:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:50:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:50:36 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:50:36 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:50:36 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:50:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.15 20:50:36 - Flushing DNS
I 2018.03.15 20:50:39 - Checking route
I 2018.03.15 20:50:40 - Checking DNS
! 2018.03.15 20:50:52 - Connected.
. 2018.03.15 20:50:52 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:55:02 - Disconnecting
. 2018.03.15 20:55:02 - Sending management termination signal
. 2018.03.15 20:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:55:07 - Connection terminated.
. 2018.03.15 20:55:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:55:07 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:55:07 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:55:07 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:55:07 - Checking authorization ...
! 2018.03.15 20:55:08 - Connecting to Asterion (United Kingdom, London)
. 2018.03.15 20:55:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:55:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:55:08 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:55:08 - Connection to OpenVPN Management Interface
. 2018.03.15 20:55:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:55:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.167:443
. 2018.03.15 20:55:08 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:55:08 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:55:08 - OpenVPN > UDP link remote: [AF_INET]217.151.98.167:443
. 2018.03.15 20:55:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:55:08 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.167:443, sid=589b31d4 0e867e99
. 2018.03.15 20:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:55:08 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:55:08 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:55:08 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:55:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:55:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.167:443
. 2018.03.15 20:55:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:55:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.22.83 255.255.0.0'
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:55:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:55:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:55:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:09 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:55:09 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:55:09 - OpenVPN > open_tun
. 2018.03.15 20:55:09 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:55:09 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:55:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.22.83/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:55:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.22.83/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.15 20:55:09 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:55:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:55:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.167 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:14 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:55:14 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:55:14 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:55:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.15 20:55:15 - Flushing DNS
I 2018.03.15 20:55:18 - Checking route
I 2018.03.15 20:55:18 - Checking DNS
! 2018.03.15 20:55:30 - Connected.
. 2018.03.15 20:55:30 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:56:32 - Disconnecting
. 2018.03.15 20:56:32 - Sending management termination signal
. 2018.03.15 20:56:32 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:56:37 - Connection terminated.
. 2018.03.15 20:56:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:56:37 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:56:37 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:56:37 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:56:37 - Checking authorization ...
! 2018.03.15 20:56:37 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:56:37 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:56:37 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:56:37 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:56:37 - Connection to OpenVPN Management Interface
. 2018.03.15 20:56:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:56:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:56:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:56:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:80
. 2018.03.15 20:56:38 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:56:38 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:56:38 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:80
. 2018.03.15 20:56:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:56:38 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:80, sid=0c2cfe67 04e855e3
. 2018.03.15 20:56:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:56:38 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:56:38 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:56:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:56:38 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:56:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:56:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:56:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:80
. 2018.03.15 20:56:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:56:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.27 255.255.0.0,peer-id 1,cipher AES-256-GCM'
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:56:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:56:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:56:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:56:39 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:56:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:56:39 - OpenVPN > open_tun
. 2018.03.15 20:56:39 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:56:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:56:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.27/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:56:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.27/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2018.03.15 20:56:39 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:56:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:56:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:56:45 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:56:45 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:56:45 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:56:45 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.6.0.1) to 10.6.0.1)
. 2018.03.15 20:56:45 - Flushing DNS
I 2018.03.15 20:56:48 - Checking route
I 2018.03.15 20:56:48 - Checking DNS
! 2018.03.15 20:57:00 - Connected.
. 2018.03.15 20:57:00 - OpenVPN > Initialization Sequence Completed
. 2018.03.15 20:58:25 - Updating systems & servers data ...
. 2018.03.15 20:58:27 - Systems & servers data update completed
! 2018.03.15 20:58:51 - Disconnecting
. 2018.03.15 20:58:51 - Sending management termination signal
. 2018.03.15 20:58:51 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:58:56 - Connection terminated.
. 2018.03.15 20:58:56 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:58:56 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:58:56 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:58:56 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:58:56 - Checking authorization ...
! 2018.03.15 20:58:56 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Reading configuration from file D:\Program Files\AirVPN\fc16cb516fe867d9b55d369bfc519a60fd5552c212b4d48c93fb04367574e338.tmp.ssl
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: UTF-8 byte order mark not detected
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG6[ui]: Initializing service [openvpn]
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Configuration successful
. 2018.03.15 20:58:56 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:58:56 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:58:56 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:58:56 - Connection to OpenVPN Management Interface
. 2018.03.15 20:58:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:58:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:58:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:58:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:57947
. 2018.03.15 20:58:57 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:58:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:57947 [nonblock]
. 2018.03.15 20:58:57 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:57947
. 2018.03.15 20:58:57 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 20:58:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:57947
. 2018.03.15 20:58:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:8894
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: s_connect: connecting 80.84.49.51:443
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: s_connect: connected 80.84.49.51:443
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.24:8895
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: SNI: sending servername: 80.84.49.51
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Peer certificate not required
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Certificate verification disabled
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Client certificate not requested
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: TLS connected: new session negotiated
. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2018.03.15 20:58:57 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:57947, sid=13677e1a ba555f8e
. 2018.03.15 20:58:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:58:57 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:58:57 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:58:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:58:57 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:58:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:58:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:58:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:57947
. 2018.03.15 20:58:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:58:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.240 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:58:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:58:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:58:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:58:58 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:58:58 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:58:58 - OpenVPN > open_tun
. 2018.03.15 20:58:58 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:58:58 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:58:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.240/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:58:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.240/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2018.03.15 20:58:58 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:58:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:59:03 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.51 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:59:04 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:59:04 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:59:04 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:59:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
. 2018.03.15 20:59:04 - Flushing DNS
I 2018.03.15 20:59:07 - Checking route
I 2018.03.15 20:59:07 - Checking DNS
! 2018.03.15 20:59:19 - Connected.
. 2018.03.15 20:59:19 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:59:41 - Disconnecting
. 2018.03.15 20:59:41 - Sending management termination signal
. 2018.03.15 20:59:41 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:59:51 - Sending soft termination signal
. 2018.03.15 20:59:51 - Connection terminated.
. 2018.03.15 20:59:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:59:51 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:59:51 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:59:51 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
. 2018.03.15 20:59:51 - Flushing DNS
. 2018.03.15 20:59:54 - IPv6 restored with packet filtering.
! 2018.03.15 20:59:54 - Session terminated.
I 2018.03.15 21:00:01 - Session starting.
. 2018.03.15 21:00:01 - IPv6 disabled with packet filtering.
I 2018.03.15 21:00:01 - Checking authorization ...
! 2018.03.15 21:00:01 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 21:00:01 - SSH > Looking up host "80.84.49.4"
. 2018.03.15 21:00:01 - SSH > Connecting to 80.84.49.4 port 22
. 2018.03.15 21:00:01 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67
. 2018.03.15 21:00:01 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u2
. 2018.03.15 21:00:01 - SSH > Using SSH protocol version 2
. 2018.03.15 21:00:01 - SSH > Doing Diffie-Hellman group exchange
. 2018.03.15 21:00:01 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2018.03.15 21:00:01 - SSH > Host key fingerprint is:
. 2018.03.15 21:00:01 - SSH > ssh-rsa 2048 e3:2e:ee:7f:2c:20:8b:dc:78:a3:e2:a5:fd:c4:cf:13
. 2018.03.15 21:00:01 - SSH > The server's host key is not cached in the registry. You
. 2018.03.15 21:00:01 - SSH > have no guarantee that the server is the computer you
. 2018.03.15 21:00:01 - SSH > think it is.
. 2018.03.15 21:00:01 - SSH > The server's rsa2 key fingerprint is:
. 2018.03.15 21:00:01 - SSH > ssh-rsa 2048 e3:2e:ee:7f:2c:20:8b:dc:78:a3:e2:a5:fd:c4:cf:13
. 2018.03.15 21:00:01 - SSH > If you trust this host, enter "y" to add the key to
. 2018.03.15 21:00:01 - SSH > PuTTY's cache and carry on connecting.
. 2018.03.15 21:00:01 - SSH > If you want to carry on connecting just once, without
. 2018.03.15 21:00:01 - SSH > adding the key to the cache, enter "n".
. 2018.03.15 21:00:01 - SSH > If you do not trust this host, press Return to abandon the
. 2018.03.15 21:00:01 - SSH > connection.
. 2018.03.15 21:00:01 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption
. 2018.03.15 21:00:01 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2018.03.15 21:00:01 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2018.03.15 21:00:01 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2018.03.15 21:00:01 - SSH > Reading private key file "D:\Program Files\AirVPN\7020f2cf7cfe781f25126d9e5405a185eaf5f23f55fdada3d41f110d15b24b45.tmp.ppk"
. 2018.03.15 21:00:01 - SSH > Using username "sshtunnel".
. 2018.03.15 21:00:01 - SSH > Offered public key
. 2018.03.15 21:00:02 - SSH > Offer of public key accepted
. 2018.03.15 21:00:02 - SSH > Authenticating with public key ""
. 2018.03.15 21:00:02 - SSH > Sent public key signature
. 2018.03.15 21:00:02 - SSH > Access granted
. 2018.03.15 21:00:02 - SSH > Local port 33166 forwarding to 127.0.0.1:2018
. 2018.03.15 21:00:02 - SSH > Remote debug message: PTY allocation disabled.
. 2018.03.15 21:00:02 - SSH > Remote debug message: X11 forwarding disabled.
. 2018.03.15 21:00:02 - SSH > Remote debug message: Forced command.
. 2018.03.15 21:00:02 - SSH > Remote debug message: PTY allocation disabled.
. 2018.03.15 21:00:02 - SSH > Remote debug message: X11 forwarding disabled.
. 2018.03.15 21:00:02 - SSH > Remote debug message: Forced command.
. 2018.03.15 21:00:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 21:00:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 21:00:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 21:00:02 - Connection to OpenVPN Management Interface
. 2018.03.15 21:00:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 21:00:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 21:00:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 21:00:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:33166
. 2018.03.15 21:00:02 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 21:00:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:33166 [nonblock]
. 2018.03.15 21:00:02 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:33166
. 2018.03.15 21:00:02 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 21:00:02 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:33166
. 2018.03.15 21:00:02 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:9328
. 2018.03.15 21:00:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 21:00:02 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:33166, sid=4ca48219 346cd084
. 2018.03.15 21:00:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 21:00:02 - OpenVPN > VERIFY KU OK
. 2018.03.15 21:00:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 21:00:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 21:00:02 - OpenVPN > VERIFY EKU OK
. 2018.03.15 21:00:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 21:00:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 21:00:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:33166
. 2018.03.15 21:00:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 21:00:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.240 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 21:00:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 21:00:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 21:00:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 21:00:03 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 21:00:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 21:00:03 - OpenVPN > open_tun
. 2018.03.15 21:00:03 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 21:00:03 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 21:00:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.240/255.255.0.0 [SUCCEEDED]
. 2018.03.15 21:00:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.240/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2018.03.15 21:00:03 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 21:00:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 21:00:08 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 21:00:08 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 21:00:08 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 21:00:08 - DNS leak protection with packet filtering enabled.
. 2018.03.15 21:00:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
. 2018.03.15 21:00:08 - Flushing DNS
I 2018.03.15 21:00:11 - Checking route
I 2018.03.15 21:00:12 - Checking DNS
! 2018.03.15 21:00:24 - Connected.
. 2018.03.15 21:00:24 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 21:01:07 - Disconnecting
. 2018.03.15 21:01:07 - Sending management termination signal
. 2018.03.15 21:01:07 - Management - Send 'signal SIGTERM'
. 2018.03.15 21:01:17 - Sending soft termination signal
. 2018.03.15 21:01:17 - Connection terminated.
. 2018.03.15 21:01:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 21:01:17 - DNS leak protection with packet filtering disabled.
. 2018.03.15 21:01:17 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 21:01:17 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 21:01:17 - Checking authorization ...
! 2018.03.15 21:01:17 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:18 - Disconnecting
. 2018.03.15 21:01:18 - Connection terminated.
I 2018.03.15 21:01:21 - Checking authorization ...
! 2018.03.15 21:01:21 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:21 - Disconnecting
. 2018.03.15 21:01:21 - Connection terminated.
I 2018.03.15 21:01:24 - Checking authorization ...
! 2018.03.15 21:01:24 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:24 - Disconnecting
. 2018.03.15 21:01:24 - Connection terminated.
I 2018.03.15 21:01:27 - Checking authorization ...
! 2018.03.15 21:01:28 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:28 - Disconnecting
. 2018.03.15 21:01:28 - Connection terminated.
I 2018.03.15 21:01:31 - Checking authorization ...
! 2018.03.15 21:01:31 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:31 - Disconnecting
. 2018.03.15 21:01:31 - Connection terminated.
I 2018.03.15 21:01:34 - Checking authorization ...
! 2018.03.15 21:01:34 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:34 - Disconnecting
. 2018.03.15 21:01:34 - Connection terminated.
I 2018.03.15 21:01:37 - Checking authorization ...
! 2018.03.15 21:01:38 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:38 - Disconnecting
. 2018.03.15 21:01:38 - Connection terminated.
I 2018.03.15 21:01:41 - Checking authorization ...
! 2018.03.15 21:01:41 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:41 - Disconnecting
. 2018.03.15 21:01:41 - Connection terminated.
I 2018.03.15 21:01:44 - Checking authorization ...
! 2018.03.15 21:01:44 - Connecting to Algedi (United Kingdom, London)
! 2018.03.15 21:01:45 - Disconnecting
. 2018.03.15 21:01:45 - Connection terminated.
I 2018.03.15 21:01:48 - Checking authorization ...
. 2018.03.15 21:01:48 - Flushing DNS
. 2018.03.15 21:01:51 - IPv6 restored with packet filtering.
! 2018.03.15 21:01:51 - Session terminated.
! 2018.03.15 21:02:59 - Deactivation of Network Lock
. 2018.03.15 21:08:43 - Updating systems & servers data ...
. 2018.03.15 21:08:44 - Systems & servers data update completed
. 2018.03.15 21:19:20 - Updating systems & servers data ...
. 2018.03.15 21:19:20 - Systems & servers data update completed
I 2018.03.15 20:32:05 - Session starting.
I 2018.03.15 20:32:05 - Checking authorization ...
! 2018.03.15 20:32:05 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:32:05 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:32:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:32:05 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:32:05 - Connection to OpenVPN Management Interface
. 2018.03.15 20:32:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:32:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:32:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:32:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:1194
. 2018.03.15 20:32:05 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:32:05 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:1194 [nonblock]
. 2018.03.15 20:32:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:32:06 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:1194
. 2018.03.15 20:32:06 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 20:32:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:1194
. 2018.03.15 20:32:06 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:1194, sid=393b0ee1 5a33104e
. 2018.03.15 20:32:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:32:06 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:32:06 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:32:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:32:06 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:32:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:32:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:32:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:1194
! 2018.03.15 20:32:07 - Disconnecting
. 2018.03.15 20:32:07 - Sending management termination signal
. 2018.03.15 20:32:07 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:32:07 - Connection terminated.
I 2018.03.15 20:32:07 - Cancel requested.
! 2018.03.15 20:32:07 - Session terminated.
! 2018.03.15 20:32:09 - Activation of Network Lock - Windows Filtering Platform
I 2018.03.15 20:32:37 - Session starting.
I 2018.03.15 20:32:38 - Checking authorization ...
! 2018.03.15 20:32:38 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:32:38 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:32:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:32:38 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:32:38 - Connection to OpenVPN Management Interface
. 2018.03.15 20:32:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:32:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:32:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:32:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:2018
. 2018.03.15 20:32:38 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:32:38 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:32:38 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:2018
. 2018.03.15 20:32:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:32:38 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:2018, sid=781441b6 35eedc63
. 2018.03.15 20:32:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:32:38 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:32:38 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:32:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:32:38 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:32:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:32:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:32:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:2018
. 2018.03.15 20:32:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:32:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.0.75 255.255.0.0,peer-id 4,cipher AES-256-GCM'
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:32:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:32:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:32:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:32:39 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:32:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:32:39 - OpenVPN > open_tun
. 2018.03.15 20:32:39 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:32:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:32:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.0.0/10.30.0.75/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:32:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.0.75/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.30.255.254, lease-time: 31536000]
. 2018.03.15 20:32:39 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:32:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:32:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.0.1
. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.0.1
. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:32:44 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:32:44 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:32:44 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:32:45 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.30.0.1) to 10.30.0.1)
. 2018.03.15 20:32:45 - Flushing DNS
I 2018.03.15 20:32:48 - Checking route
I 2018.03.15 20:32:48 - Checking DNS
! 2018.03.15 20:33:03 - Connected.
. 2018.03.15 20:33:03 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:34:26 - Disconnecting
. 2018.03.15 20:34:26 - Sending management termination signal
. 2018.03.15 20:34:26 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:34:31 - Connection terminated.
. 2018.03.15 20:34:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:34:31 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:34:31 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:34:31 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
. 2018.03.15 20:34:31 - Flushing DNS
! 2018.03.15 20:34:34 - Session terminated.
I 2018.03.15 20:34:43 - Session starting.
I 2018.03.15 20:34:44 - Checking authorization ...
! 2018.03.15 20:34:44 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:34:44 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:34:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:34:44 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:34:44 - Connection to OpenVPN Management Interface
. 2018.03.15 20:34:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:34:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:34:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:34:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:41185
. 2018.03.15 20:34:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:34:44 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:34:44 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:41185
. 2018.03.15 20:34:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:34:44 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:41185, sid=5a78c932 d6331fe7
. 2018.03.15 20:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:34:44 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:34:44 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:34:44 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:34:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:41185
. 2018.03.15 20:34:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:34:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.0.75 255.255.0.0,peer-id 4,cipher AES-256-GCM'
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:34:45 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:34:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:34:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:34:45 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:34:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:34:45 - OpenVPN > open_tun
. 2018.03.15 20:34:45 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:34:45 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:34:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.0.0/10.30.0.75/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:34:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.0.75/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.30.255.254, lease-time: 31536000]
. 2018.03.15 20:34:45 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:34:45 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:34:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:34:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:34:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.0.1
. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:34:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.0.1
. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:34:51 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:34:51 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:34:51 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:34:51 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.30.0.1) to 10.30.0.1)
. 2018.03.15 20:34:51 - Flushing DNS
I 2018.03.15 20:34:54 - Checking route
I 2018.03.15 20:34:54 - Checking DNS
! 2018.03.15 20:35:06 - Connected.
. 2018.03.15 20:35:06 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:35:43 - Disconnecting
. 2018.03.15 20:35:43 - Sending management termination signal
. 2018.03.15 20:35:43 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:35:48 - Connection terminated.
. 2018.03.15 20:35:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:35:48 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:35:48 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:35:48 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:35:48 - Checking authorization ...
! 2018.03.15 20:35:48 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:35:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:35:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:35:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:35:48 - Connection to OpenVPN Management Interface
. 2018.03.15 20:35:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:35:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:35:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:35:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:80
. 2018.03.15 20:35:48 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:35:48 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:35:48 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:80
. 2018.03.15 20:35:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:35:48 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:80, sid=f64dbab0 e03c111c
. 2018.03.15 20:35:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:35:48 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:35:48 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:35:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:35:48 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:35:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:35:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:35:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:80
. 2018.03.15 20:35:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:35:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.27 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:35:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:35:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:35:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:35:50 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:35:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:35:50 - OpenVPN > open_tun
. 2018.03.15 20:35:50 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:35:50 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:35:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.27/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:35:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.27/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2018.03.15 20:35:50 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:35:50 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:35:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:35:55 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:35:55 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:35:55 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:35:55 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.6.0.1) to 10.6.0.1)
. 2018.03.15 20:35:55 - Flushing DNS
I 2018.03.15 20:35:58 - Checking route
I 2018.03.15 20:35:58 - Checking DNS
! 2018.03.15 20:36:11 - Connected.
. 2018.03.15 20:36:11 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:37:03 - Disconnecting
. 2018.03.15 20:37:03 - Sending management termination signal
. 2018.03.15 20:37:03 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:37:08 - Connection terminated.
. 2018.03.15 20:37:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:37:08 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:37:08 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:37:08 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:37:08 - Checking authorization ...
! 2018.03.15 20:37:08 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:37:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:37:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:37:08 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:37:08 - Connection to OpenVPN Management Interface
. 2018.03.15 20:37:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:37:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:37:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:37:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:443
. 2018.03.15 20:37:08 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:37:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:443 [nonblock]
. 2018.03.15 20:37:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:37:09 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:443
. 2018.03.15 20:37:09 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 20:37:09 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:443
. 2018.03.15 20:37:09 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=7c5f6b35 76bfd095
. 2018.03.15 20:37:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:37:09 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:37:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:37:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:37:09 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:37:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:37:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:37:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443
. 2018.03.15 20:37:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:37:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.4 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:37:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:37:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:37:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:37:11 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:37:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:37:11 - OpenVPN > open_tun
. 2018.03.15 20:37:11 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:37:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:37:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.4/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:37:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.4/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2018.03.15 20:37:11 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:37:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:37:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:37:15 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:37:15 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:37:15 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:37:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)
. 2018.03.15 20:37:15 - Flushing DNS
I 2018.03.15 20:37:18 - Checking route
I 2018.03.15 20:37:18 - Checking DNS
! 2018.03.15 20:37:31 - Connected.
. 2018.03.15 20:37:31 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:46:44 - Disconnecting
. 2018.03.15 20:46:44 - Sending management termination signal
. 2018.03.15 20:46:44 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:46:44 - Connection terminated.
. 2018.03.15 20:46:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:46:44 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:46:44 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:46:44 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:46:44 - Checking authorization ...
! 2018.03.15 20:46:45 - Connecting to Alshain (United Kingdom, London)
. 2018.03.15 20:46:45 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:46:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:46:45 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:46:45 - Connection to OpenVPN Management Interface
. 2018.03.15 20:46:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:46:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:46:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:46:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.162:443
. 2018.03.15 20:46:45 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:46:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]217.151.98.162:443 [nonblock]
. 2018.03.15 20:46:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:46:46 - OpenVPN > TCP connection established with [AF_INET]217.151.98.162:443
. 2018.03.15 20:46:46 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 20:46:46 - OpenVPN > TCP_CLIENT link remote: [AF_INET]217.151.98.162:443
. 2018.03.15 20:46:46 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=b77641ce 4b1e416d
. 2018.03.15 20:46:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:46:46 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:46:46 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:46:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:46:46 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:46:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:46:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:46:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443
. 2018.03.15 20:46:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:46:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.167 255.255.0.0'
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:46:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:46:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:46:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.15 20:46:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:46:47 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:46:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:46:47 - OpenVPN > open_tun
. 2018.03.15 20:46:47 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:46:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:46:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.167/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:46:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.167/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2018.03.15 20:46:47 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:46:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:46:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:46:53 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:46:53 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:46:53 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:46:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)
. 2018.03.15 20:46:53 - Flushing DNS
I 2018.03.15 20:46:56 - Checking route
I 2018.03.15 20:46:56 - Checking DNS
! 2018.03.15 20:47:10 - Connected.
. 2018.03.15 20:47:10 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:51:22 - Disconnecting
. 2018.03.15 20:51:22 - Sending management termination signal
. 2018.03.15 20:51:22 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:51:22 - Connection terminated.
. 2018.03.15 20:51:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:51:22 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:51:22 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:51:22 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:51:22 - Checking authorization ...
! 2018.03.15 20:51:22 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:51:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:51:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:51:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:51:23 - Connection to OpenVPN Management Interface
. 2018.03.15 20:51:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:51:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:51:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:51:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:443
. 2018.03.15 20:51:23 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:51:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:443 [nonblock]
. 2018.03.15 20:51:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:51:24 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:443
. 2018.03.15 20:51:24 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.15 20:51:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:443
. 2018.03.15 20:51:24 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=543b4588 0f790cd7
. 2018.03.15 20:51:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:51:24 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:51:24 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:51:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:51:24 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:51:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:51:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:51:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443
. 2018.03.15 20:51:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:51:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.4 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:51:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:51:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:51:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:51:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:51:25 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:51:25 - OpenVPN > open_tun
. 2018.03.15 20:51:25 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:51:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:51:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.4/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:51:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.4/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2018.03.15 20:51:25 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:51:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:51:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:51:30 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:51:30 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:51:30 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:51:30 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)
. 2018.03.15 20:51:30 - Flushing DNS
I 2018.03.15 20:51:33 - Checking route
I 2018.03.15 20:51:34 - Checking DNS
! 2018.03.15 20:51:46 - Connected.
. 2018.03.15 20:51:46 - OpenVPN > Initialization Sequence Completed
! 2018.03.15 20:55:31 - Disconnecting
. 2018.03.15 20:55:31 - Sending management termination signal
. 2018.03.15 20:55:31 - Management - Send 'signal SIGTERM'
. 2018.03.15 20:55:31 - Connection terminated.
. 2018.03.15 20:55:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.15 20:55:31 - DNS leak protection with packet filtering disabled.
. 2018.03.15 20:55:31 - Interface Airvpn metric restored from 3 to 5, layer IPv4
. 2018.03.15 20:55:31 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6
I 2018.03.15 20:55:31 - Checking authorization ...
! 2018.03.15 20:55:32 - Connecting to Algedi (United Kingdom, London)
. 2018.03.15 20:55:32 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.15 20:55:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.15 20:55:32 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.15 20:55:32 - Connection to OpenVPN Management Interface
. 2018.03.15 20:55:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.15 20:55:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.15 20:55:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:53
. 2018.03.15 20:55:32 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2018.03.15 20:55:32 - OpenVPN > UDP link local: (not bound)
. 2018.03.15 20:55:32 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:53
. 2018.03.15 20:55:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.15 20:55:32 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:53, sid=9673f792 c00b7a45
. 2018.03.15 20:55:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.15 20:55:32 - OpenVPN > VERIFY KU OK
. 2018.03.15 20:55:32 - OpenVPN > Validating certificate extended key usage
. 2018.03.15 20:55:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.15 20:55:32 - OpenVPN > VERIFY EKU OK
. 2018.03.15 20:55:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.15 20:55:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.15 20:55:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:53
. 2018.03.15 20:55:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.15 20:55:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.26 255.255.0.0,peer-id 1,cipher AES-256-GCM'
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.15 20:55:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.15 20:55:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:55:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.15 20:55:33 - OpenVPN > interactive service msg_channel=0
. 2018.03.15 20:55:33 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48
. 2018.03.15 20:55:33 - OpenVPN > open_tun
. 2018.03.15 20:55:33 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap
. 2018.03.15 20:55:33 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.15 20:55:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.26/255.255.0.0 [SUCCEEDED]
. 2018.03.15 20:55:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.26/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.8.255.254, lease-time: 31536000]
. 2018.03.15 20:55:33 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}
. 2018.03.15 20:55:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.15 20:55:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4
. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.15 20:55:39 - Interface Airvpn metric changed from 5 to 3, layer IPv4
. 2018.03.15 20:55:39 - Interface Airvpn metric changed from Automatic to 3, layer IPv6
. 2018.03.15 20:55:39 - DNS leak protection with packet filtering enabled.
. 2018.03.15 20:55:39 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1)
. 2018.03.15 20:55:39 - Flushing DNS
I 2018.03.15 20:55:42 - Checking route
I 2018.03.15 20:55:42 - Checking DNS
! 2018.03.15 20:55:54 - Connected.
. 2018.03.15 20:55:54 - OpenVPN > Initialization Sequence Completed
 
----------------------------
Network Interfaces:
 
Network Interface: Airvpn (TAP-Windows Adapter V9, ID:{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}) - Ethernet - Up
Network Interface: Ethernet (Intel® 82579V Gigabit Network Connection, ID:{6D5E91B7-53DC-4AB8-9DFA-868EF8060C5D}) - Ethernet - Up
Network Interface: WiFi (Qualcomm Atheros AR9485 Wireless Network Adapter, ID:{D294068B-C945-49FF-8150-01451E7BBA4A}) - Wireless80211 - Down
Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2881360B-773D-4BD0-9441-D968DB321622}) - Wireless80211 - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{3B91D51F-CF81-11E7-BED8-806E6F6E6963}) - Loopback - Up
 
----------------------------
Default gateways:
 
192.168.0.1, Intel® 82579V Gigabit Network Connection
 
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : DESKTOP-2ESTVBJ
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Airvpn:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-2A-F9-14-A8
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::dc3:1b2f:eec6:b0bf%5(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.8.0.26(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : 15 March 2018 20:55:33
   Lease Expires . . . . . . . . . . : 15 March 2019 20:55:33
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.8.255.254
   DHCPv6 IAID . . . . . . . . . . . : 167837482
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-A7-27-67-60-A4-4C-40-DA-48
   DNS Servers . . . . . . . . . . . : 10.8.0.1
   NetBIOS over Tcpip. . . . . . . . : Disabled
 
Ethernet adapter Ethernet:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel® 82579V Gigabit Network Connection
   Physical Address. . . . . . . . . : 60-A4-4C-40-DA-48
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::2976:3ba6:ca1c:bb6d%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.0.24(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : 15 March 2018 20:26:00
   Lease Expires . . . . . . . . . . : 25 March 2018 19:25:59
   Default Gateway . . . . . . . . . : 192.168.0.1
   DHCP Server . . . . . . . . . . . : 192.168.0.1
   DHCPv6 IAID . . . . . . . . . . . : 73442380
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-A7-27-67-60-A4-4C-40-DA-48
   DNS Servers . . . . . . . . . . . : 194.168.4.100
                                       194.168.8.100
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Wireless LAN adapter WiFi:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Qualcomm Atheros AR9485 Wireless Network Adapter
   Physical Address. . . . . . . . . : 6C-71-D9-59-CB-DC
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 1E-71-D9-59-CB-DC
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
----------------------------
route print:
 
===========================================================================
Interface List
  5...00 ff 2a f9 14 a8 ......TAP-Windows Adapter V9
  8...60 a4 4c 40 da 48 ......Intel® 82579V Gigabit Network Connection
 13...6c 71 d9 59 cb dc ......Qualcomm Atheros AR9485 Wireless Network Adapter
  4...1e 71 d9 59 cb dc ......Microsoft Wi-Fi Direct Virtual Adapter
  1...........................Software Loopback Interface 1
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.0.1     192.168.0.24     25
          0.0.0.0        128.0.0.0         10.8.0.1        10.8.0.26      3
         10.8.0.0      255.255.0.0         On-link         10.8.0.26    259
        10.8.0.26  255.255.255.255         On-link         10.8.0.26    259
     10.8.255.255  255.255.255.255         On-link         10.8.0.26    259
       80.84.49.4  255.255.255.255      192.168.0.1     192.168.0.24     25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.8.0.1        10.8.0.26      3
      192.168.0.0    255.255.255.0         On-link      192.168.0.24    281
     192.168.0.24  255.255.255.255         On-link      192.168.0.24    281
    192.168.0.255  255.255.255.255         On-link      192.168.0.24    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link         10.8.0.26    259
        224.0.0.0        240.0.0.0         On-link      192.168.0.24    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link         10.8.0.26    259
  255.255.255.255  255.255.255.255         On-link      192.168.0.24    281
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  5    259 fe80::/64                On-link
  8    281 fe80::/64                On-link
  5    259 fe80::dc3:1b2f:eec6:b0bf/128
                                    On-link
  8    281 fe80::2976:3ba6:ca1c:bb6d/128
                                    On-link
  1    331 ff00::/8                 On-link
  5    259 ff00::/8                 On-link
  8    281 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None


#4 Staff

Staff

    Advanced Member

  • Staff
  • PipPipPip
  • 7796 posts

Posted 16 March 2018 - 01:20 PM

Hello!

 

Please make sure that no QoS / packet filtering tools, both on your router and system, interfere with traffic, and also test (with the connection mode that could provide you with the highest throughput) different servers in various locations around you (prefer servers with lowest round trip time).

 

We don't see any bad packet / packet error in the log entries, so we tend to rule out MTU size problems.

 

Some users reported in the past interesting performance boost (in Windows) after having fine tuned the TCP/IP stack with TCPOptimizer. If all else fails, you could give it a try, please see here:

https://airvpn.org/topic/24126-tcp-optimizer-for-windows

 

It looks like that with some TCP/IP stack optimization Windows can partially fill the gap with the other systems in the tun/tap interface "performance". It is not easy in Windows to match the throughput you get in the tun/tap interface when compared to other systems (you don't have fast-io, you don't have any native tun/tap support and some other problems due to bad architecture), but with TCP Optimizer and the latest tun/tap driver throughput can be improved (of course, it is assumed that your system has a powerful enough CPU).

 

120 Mbit/s is not bad anyway if you make a comparison with just 5-6 years ago, when beating 100 Mbit/s on the tun/tap interface with the old tun/tap driver in Windows was deemed as impossible.

 

Kind regards


  • LZ1 likes this

#5 Haunt

Haunt

    Newbie

  • Members
  • Pip
  • 3 posts

Posted 16 March 2018 - 02:42 PM

Ok thank you,  I'll have a look to into it further.  

 

I mainly use speedtest.net  is there any other good speed test sites? 

 the AirVpn speed test link in the eddie app doesn't work for me.

 

Many thanks







Similar Topics Collapse

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Servers online. Online Sessions: 15200 - BW: 59811 Mbit/sYour IP: 54.197.24.206Guest Access.