Jump to content


Photo
- - - - -

Are some servers now no longer working?


Best Answer anotherusername, 23 July 2018 - 03:43 PM

Just to report: updating to the latest Eddie client appears to have resolved things and I can now connect to Dabih etc.

 

 

ps. I did try to update before my initial posts, but there was an issue installing it

Go to the full post


  • Please log in to reply
9 replies to this topic

#1 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 13 July 2018 - 03:03 PM

Although being shown in the servers window as being active, there are several servers I can no longer connect to (eg Dabih, Naos) which i have used over a long period of time.

 

I can connect to others, so I assume it is not Eddie or my PC.

 

I cannot connect to Dabih (for instance) on three different PCs. So I assume it is not one PC which has the issue.

 

What might the issue be?

 

Thanks.

 

ps It goes through the whole process of latency tests/conncecting/etc, but at the last minute just says 'disconnecting' then starts the cycle again.

 

 



#2 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 13 July 2018 - 03:03 PM

Although being shown in the servers window as being active, there are several servers I can no longer connect to (eg Dabih, Naos) which i have used over a long period of time.

 

I can connect to others, so I assume it is not Eddie or my PC.

 

I cannot connect to Dabih (for instance) on three different PCs. So I assume it is not one PC which has the issue.

 

What might the issue be?

 

Thanks.

 

ps It goes through the whole process of latency tests/conncecting/etc, but at the last minute just says 'disconnecting' then starts the cycle again.

 

 



#3 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 13 July 2018 - 03:06 PM

Although shown as being active, I cannot connect to certain servers which I have been using for a couple of years (eg Dabih / Naos).

 

Eddie goes through the whole 'latency tests/connecting' process, but at the last minute says 'disconnecting' then starts the whole process again.

 

This occurs on three different PCs with specific servers.

 

Are those servers having some kind of issue? They are not shown as doing so on this site.

 

What might the issue be?



#4 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 13 July 2018 - 03:10 PM

Apologies for multiple posts.



#5 LZ1

LZ1

    It's nice to be nice to nice people

  • Moderators
  • 1888 posts

Posted 13 July 2018 - 04:09 PM

Hello!

 

You can always check the status here.

 

Otherwise it's good if you share your entire log :).


Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. Its Guides Section has guides on Linux/Torrenting/Blocked sites & many other topics too.
Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please read the First Questions section in the link above for more details, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Tired of Windows? Why Linux Is Better.

#6 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 13 July 2018 - 10:35 PM

Thanks. Fair comment about the log!:

 

. 2018.07.13 12:40:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:27 - Starting Management Interface
. 2018.07.13 12:40:27 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:40:27 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:40:27 - Flushing DNS
I 2018.07.13 12:40:27 - Checking route
W 2018.07.13 12:40:28 - Unable to connect to the remote server
! 2018.07.13 12:40:28 - Disconnecting
. 2018.07.13 12:40:28 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:40:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:40:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:40:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:40:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:40:34 - Connection terminated.
I 2018.07.13 12:40:34 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:40:37 - Checking authorization ...
! 2018.07.13 12:40:37 - Connecting to Naos (United Kingdom, Manchester)
. 2018.07.13 12:40:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 12:40:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:40:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:40:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:40:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:40:38 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:40:38 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.117.56:443
. 2018.07.13 12:40:38 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.117.56:443, sid=2cf54d74 84bfa96e
. 2018.07.13 12:40:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:40:38 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:40:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:40:38 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:40:38 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:40:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:40:38 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:40:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:40:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.117.56:443
. 2018.07.13 12:40:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:40:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.24.220.1,route-gateway 10.24.220.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.220.13 255.255.255.0,peer-id 2'
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:40:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:40:41 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:40:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:40:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:40:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.220.0/10.24.220.13/255.255.255.0 [SUCCEEDED]
. 2018.07.13 12:40:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.220.13/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.24.220.254, lease-time: 31536000]
. 2018.07.13 12:40:41 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:40:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - Starting Management Interface
. 2018.07.13 12:40:46 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:40:47 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:47 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:40:47 - Flushing DNS
I 2018.07.13 12:40:47 - Checking route
W 2018.07.13 12:40:47 - Unable to connect to the remote server
! 2018.07.13 12:40:47 - Disconnecting
. 2018.07.13 12:40:47 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:40:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:40:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:40:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:40:52 - Connection terminated.
I 2018.07.13 12:40:52 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:40:55 - Checking authorization ...
! 2018.07.13 12:40:55 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 12:40:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 12:40:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:40:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:40:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:40:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:40:56 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:40:56 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 12:40:56 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=784457de 08fd4ba8
. 2018.07.13 12:40:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:40:56 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:40:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:40:56 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:40:56 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:40:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:40:56 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:40:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:40:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 12:40:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:40:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 13'
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:40:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:40:59 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:41:00 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:41:00 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:41:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [SUCCEEDED]
. 2018.07.13 12:41:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 12:41:00 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:41:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:41:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:05 - Starting Management Interface
. 2018.07.13 12:41:05 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:41:05 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:41:05 - Flushing DNS
I 2018.07.13 12:41:05 - Checking route
W 2018.07.13 12:41:05 - Unable to connect to the remote server
! 2018.07.13 12:41:05 - Disconnecting
. 2018.07.13 12:41:05 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:41:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:41:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:41:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:41:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:41:10 - Connection terminated.
I 2018.07.13 12:41:10 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:41:13 - Checking authorization ...
! 2018.07.13 12:41:13 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 12:41:14 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 12:41:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:41:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:41:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:41:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:14 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:41:14 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:41:14 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 12:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=20987a28 3fb471ee
. 2018.07.13 12:41:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:41:14 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:41:14 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:41:14 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:41:14 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:41:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:41:14 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:41:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:41:15 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 12:41:17 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:41:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:41:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:41:17 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:41:17 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:41:17 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:41:17 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [SUCCEEDED]
. 2018.07.13 12:41:17 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 12:41:17 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:41:22 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - Starting Management Interface
. 2018.07.13 12:41:22 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:41:22 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:22 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:41:22 - Flushing DNS
I 2018.07.13 12:41:22 - Checking route
I 2018.07.13 12:41:23 - Checking DNS
! 2018.07.13 12:41:23 - Connected.
. 2018.07.13 12:41:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 12:41:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2018.07.13 12:45:53 - Disconnecting
. 2018.07.13 12:45:53 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:45:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:45:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:45:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:45:59 - Connection terminated.
I 2018.07.13 12:45:59 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:45:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:46:02 - Checking authorization ...
! 2018.07.13 12:46:02 - Connecting to Nashira (United Kingdom, Manchester)
. 2018.07.13 12:46:02 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 12:46:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:46:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:46:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:46:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:03 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:46:03 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:46:03 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443
. 2018.07.13 12:46:03 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=1e9f0c42 25162898
. 2018.07.13 12:46:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:46:03 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:46:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:46:03 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:46:03 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:46:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:46:03 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:46:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:46:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443
. 2018.07.13 12:46:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:46:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.25.28.1,route-gateway 10.25.28.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.25.28.176 255.255.255.0,peer-id 14'
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:46:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:46:06 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:46:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:46:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:46:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.28.0/10.25.28.176/255.255.255.0 [SUCCEEDED]
. 2018.07.13 12:46:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.28.176/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.25.28.254, lease-time: 31536000]
. 2018.07.13 12:46:07 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:46:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - Starting Management Interface
. 2018.07.13 12:46:11 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:46:12 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:46:12 - Flushing DNS
I 2018.07.13 12:46:12 - Checking route
W 2018.07.13 12:46:12 - Unable to connect to the remote server
! 2018.07.13 12:46:12 - Disconnecting
. 2018.07.13 12:46:12 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:46:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:46:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:46:12 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:46:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:46:17 - Connection terminated.
I 2018.07.13 12:46:17 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:46:20 - Checking authorization ...
! 2018.07.13 12:46:21 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 12:46:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 12:46:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:46:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:46:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:46:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:21 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:46:21 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:46:21 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 12:46:21 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=b6753353 fb61feb5
. 2018.07.13 12:46:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:46:22 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:46:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:46:22 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:46:22 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:46:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:46:22 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:46:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:46:22 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 12:46:24 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:46:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:46:24 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [SUCCEEDED]
. 2018.07.13 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 12:46:24 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - Starting Management Interface
. 2018.07.13 12:46:29 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:46:29 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:29 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:46:29 - Flushing DNS
I 2018.07.13 12:46:30 - Checking route
I 2018.07.13 12:46:30 - Checking DNS
! 2018.07.13 12:46:30 - Connected.
. 2018.07.13 12:46:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:46:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 13:05:20 - Updating systems & servers data ...
. 2018.07.13 13:05:22 - Systems & servers data update completed
. 2018.07.13 13:36:14 - Updating systems & servers data ...
. 2018.07.13 13:36:16 - Systems & servers data update completed
. 2018.07.13 13:46:23 - OpenVPN > TLS: soft reset sec=0 bytes=89276060/0 pkts=125766/0
. 2018.07.13 13:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 13:46:23 - OpenVPN > Validating certificate key usage
. 2018.07.13 13:46:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 13:46:23 - OpenVPN > VERIFY KU OK
. 2018.07.13 13:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 13:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 13:46:23 - OpenVPN > VERIFY EKU OK
. 2018.07.13 13:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 13:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 14:06:40 - Updating systems & servers data ...
. 2018.07.13 14:07:40 - Systems & servers data update completed
. 2018.07.13 14:37:32 - Updating systems & servers data ...
. 2018.07.13 14:37:34 - Systems & servers data update completed
I 2018.07.13 14:46:22 - Renewing TLS key
. 2018.07.13 14:46:22 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 14:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 14:46:23 - OpenVPN > Validating certificate key usage
. 2018.07.13 14:46:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 14:46:23 - OpenVPN > VERIFY KU OK
. 2018.07.13 14:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 14:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 14:46:23 - OpenVPN > VERIFY EKU OK
. 2018.07.13 14:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 14:46:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:08:13 - Updating systems & servers data ...
. 2018.07.13 15:08:14 - Systems & servers data update completed
. 2018.07.13 15:38:51 - Updating systems & servers data ...
. 2018.07.13 15:38:52 - Systems & servers data update completed
! 2018.07.13 15:44:52 - Disconnecting
. 2018.07.13 15:44:52 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:44:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:44:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:44:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:44:58 - Connection terminated.
I 2018.07.13 15:45:00 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:03 - Checking authorization ...
! 2018.07.13 15:45:04 - Connecting to Naos (United Kingdom, Manchester)
. 2018.07.13 15:45:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 15:45:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:05 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:05 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.117.56:443
. 2018.07.13 15:45:05 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.117.56:443, sid=064fb171 95078e34
. 2018.07.13 15:45:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:05 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:05 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:05 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:05 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.117.56:443
. 2018.07.13 15:45:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.24.220.1,route-gateway 10.24.220.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.220.13 255.255.255.0,peer-id 5'
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:08 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:08 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.220.0/10.24.220.13/255.255.255.0 [SUCCEEDED]
. 2018.07.13 15:45:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.220.13/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.24.220.254, lease-time: 31536000]
. 2018.07.13 15:45:08 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - Starting Management Interface
. 2018.07.13 15:45:14 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:14 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:14 - Flushing DNS
I 2018.07.13 15:45:14 - Checking route
W 2018.07.13 15:45:14 - Unable to connect to the remote server
! 2018.07.13 15:45:15 - Disconnecting
. 2018.07.13 15:45:15 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:15 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:45:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:45:20 - Connection terminated.
I 2018.07.13 15:45:20 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:30 - Checking authorization ...
! 2018.07.13 15:45:30 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 15:45:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 15:45:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:31 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:31 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:31 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:31 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=89bc1543 accb0dd8
. 2018.07.13 15:45:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:31 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:31 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:31 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:31 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 6'
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:34 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:34 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [SUCCEEDED]
. 2018.07.13 15:45:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 15:45:34 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - Starting Management Interface
. 2018.07.13 15:45:39 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:39 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:39 - Flushing DNS
I 2018.07.13 15:45:39 - Checking route
W 2018.07.13 15:45:39 - Unable to connect to the remote server
! 2018.07.13 15:45:40 - Disconnecting
. 2018.07.13 15:45:40 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:45:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:45:45 - Connection terminated.
I 2018.07.13 15:45:45 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:49 - Checking authorization ...
! 2018.07.13 15:45:49 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 15:45:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 15:45:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:50 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:50 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:50 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=d7dc62e2 d2fa4a03
. 2018.07.13 15:45:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:50 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:50 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:50 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:50 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 6'
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:53 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [SUCCEEDED]
. 2018.07.13 15:45:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 15:45:53 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:58 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - Starting Management Interface
. 2018.07.13 15:45:58 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:58 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:58 - Flushing DNS
I 2018.07.13 15:45:58 - Checking route
W 2018.07.13 15:45:58 - Unable to connect to the remote server
! 2018.07.13 15:45:58 - Disconnecting
. 2018.07.13 15:45:58 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:58 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:58 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2018.07.13 15:45:58 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:46:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:46:03 - Connection terminated.
I 2018.07.13 15:46:03 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:46:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:46:06 - Checking authorization ...
! 2018.07.13 15:46:06 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 15:46:07 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 15:46:07 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:46:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:46:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:46:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:07 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:46:07 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:46:07 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 15:46:07 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=46b4abb3 86ba0a10
. 2018.07.13 15:46:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:46:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:46:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:46:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:46:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:46:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:46:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:46:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:46:08 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 15:46:10 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:46:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:46:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:46:10 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:46:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:46:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:46:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [SUCCEEDED]
. 2018.07.13 15:46:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 15:46:10 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:46:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - Starting Management Interface
. 2018.07.13 15:46:16 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:46:16 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:46:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:46:16 - Flushing DNS
I 2018.07.13 15:46:16 - Checking route
I 2018.07.13 15:46:17 - Checking DNS
! 2018.07.13 15:46:17 - Connected.
. 2018.07.13 15:46:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 15:46:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2018.07.13 15:54:51 - Disconnecting
. 2018.07.13 15:54:51 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:54:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:54:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:54:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:54:57 - Connection terminated.
I 2018.07.13 15:54:57 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:54:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:55:00 - Checking authorization ...
! 2018.07.13 15:55:00 - Connecting to Algedi (United Kingdom, London)
. 2018.07.13 15:55:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2018.07.13 15:55:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:55:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:55:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:55:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:55:01 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:55:01 - OpenVPN > UDPv4 link remote: [AF_INET]80.84.49.4:443
. 2018.07.13 15:55:01 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=46d83e42 3d772771
. 2018.07.13 15:55:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:55:01 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:55:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:55:01 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:55:01 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:55:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:55:01 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:55:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:55:01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443
. 2018.07.13 15:55:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:55:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.10 255.255.0.0,peer-id 65'
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:55:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:55:04 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:55:04 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:55:04 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:55:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.10/255.255.0.0 [SUCCEEDED]
. 2018.07.13 15:55:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.10/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 15:55:04 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:55:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - Starting Management Interface
. 2018.07.13 15:55:09 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:55:09 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:55:09 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:55:09 - Flushing DNS
I 2018.07.13 15:55:10 - Checking route
I 2018.07.13 15:55:10 - Checking DNS
! 2018.07.13 15:55:10 - Connected.
. 2018.07.13 15:55:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 15:55:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 16:09:30 - Updating systems & servers data ...
. 2018.07.13 16:09:32 - Systems & servers data update completed
. 2018.07.13 16:40:19 - Updating systems & servers data ...
. 2018.07.13 16:40:21 - Systems & servers data update completed
. 2018.07.13 16:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=45737104/0 pkts=66039/0
. 2018.07.13 16:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 16:55:02 - OpenVPN > Validating certificate key usage
. 2018.07.13 16:55:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 16:55:02 - OpenVPN > VERIFY KU OK
. 2018.07.13 16:55:02 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 16:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 16:55:02 - OpenVPN > VERIFY EKU OK
. 2018.07.13 16:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 16:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 17:10:41 - Updating systems & servers data ...
. 2018.07.13 17:10:42 - Systems & servers data update completed
. 2018.07.13 17:41:19 - Updating systems & servers data ...
. 2018.07.13 17:41:20 - Systems & servers data update completed
I 2018.07.13 17:55:02 - Renewing TLS key
. 2018.07.13 17:55:02 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 17:55:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 17:55:04 - OpenVPN > Validating certificate key usage
. 2018.07.13 17:55:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 17:55:04 - OpenVPN > VERIFY KU OK
. 2018.07.13 17:55:04 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 17:55:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 17:55:04 - OpenVPN > VERIFY EKU OK
. 2018.07.13 17:55:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 17:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 18:11:58 - Updating systems & servers data ...
. 2018.07.13 18:11:59 - Systems & servers data update completed
. 2018.07.13 18:42:36 - Updating systems & servers data ...
. 2018.07.13 18:42:37 - Systems & servers data update completed
. 2018.07.13 18:55:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 18:55:04 - OpenVPN > Validating certificate key usage
. 2018.07.13 18:55:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 18:55:04 - OpenVPN > VERIFY KU OK
. 2018.07.13 18:55:04 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 18:55:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 18:55:04 - OpenVPN > VERIFY EKU OK
. 2018.07.13 18:55:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 18:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 19:13:15 - Updating systems & servers data ...
. 2018.07.13 19:13:16 - Systems & servers data update completed
. 2018.07.13 19:43:54 - Updating systems & servers data ...
. 2018.07.13 19:43:55 - Systems & servers data update completed
. 2018.07.13 19:55:04 - OpenVPN > TLS: soft reset sec=0 bytes=684764/0 pkts=2091/0
. 2018.07.13 19:55:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 19:55:05 - OpenVPN > Validating certificate key usage
. 2018.07.13 19:55:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 19:55:05 - OpenVPN > VERIFY KU OK
. 2018.07.13 19:55:05 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 19:55:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 19:55:05 - OpenVPN > VERIFY EKU OK
. 2018.07.13 19:55:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 19:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 20:14:32 - Updating systems & servers data ...
. 2018.07.13 20:14:33 - Systems & servers data update completed
. 2018.07.13 20:45:11 - Updating systems & servers data ...
. 2018.07.13 20:45:13 - Systems & servers data update completed
I 2018.07.13 20:55:04 - Renewing TLS key
. 2018.07.13 20:55:04 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 20:55:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 20:55:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 20:55:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 20:55:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 20:55:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 20:55:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 20:55:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 20:55:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 20:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 21:15:51 - Updating systems & servers data ...
. 2018.07.13 21:15:52 - Systems & servers data update completed
. 2018.07.13 21:46:45 - Updating systems & servers data ...
. 2018.07.13 21:46:49 - Systems & servers data update completed
. 2018.07.13 21:55:07 - OpenVPN > TLS: soft reset sec=0 bytes=38949152/0 pkts=57822/0
. 2018.07.13 21:55:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 21:55:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 21:55:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 21:55:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 21:55:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 21:55:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 21:55:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 21:55:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 21:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 22:17:29 - Updating systems & servers data ...
. 2018.07.13 22:17:31 - Systems & servers data update completed
. 2018.07.13 22:48:13 - Updating systems & servers data ...
. 2018.07.13 22:48:15 - Systems & servers data update completed
. 2018.07.13 22:55:07 - OpenVPN > TLS: soft reset sec=0 bytes=1825600/0 pkts=4493/0
. 2018.07.13 22:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 22:55:08 - OpenVPN > Validating certificate key usage
. 2018.07.13 22:55:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 22:55:08 - OpenVPN > VERIFY KU OK
. 2018.07.13 22:55:08 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 22:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 22:55:08 - OpenVPN > VERIFY EKU OK
. 2018.07.13 22:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 22:55:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 23:18:52 - Updating systems & servers data ...
. 2018.07.13 23:18:54 - Systems & servers data update completed
 



#7 LZ1

LZ1

    It's nice to be nice to nice people

  • Moderators
  • 1888 posts

Posted 17 July 2018 - 10:37 PM

Are you using the latest Eddie client? There's also an experimental release yet again.


Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. Its Guides Section has guides on Linux/Torrenting/Blocked sites & many other topics too.
Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please read the First Questions section in the link above for more details, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Tired of Windows? Why Linux Is Better.

#8 X22Y55Zbc

X22Y55Zbc

    Newbie

  • Members
  • Pip
  • 3 posts

Posted 21 July 2018 - 09:14 PM

I Also am having what I believe to be the same issue.

I am running an older version not updated at all to a recent version,

Only able to connect to about 40% of the servers.

I'm assuming the other 60% are being changed, updated, upgraded or in some way modified

as part of modernization ?

 

Has Dabih, for example received any new programing in the last 2 / 3 weeks ?

Curious for curiosity sake.

 

I will be updating the airvpn installation i have on my machine with in 12 hours and hopefully at the least

I will not lose any ground and may regain ability to connect on servers I cannot now.

 

If I do not reply to this thread with in 24 hours,

upgrading has not had a positive effect and in fact has worsened the situation

in that case please investigate a corrolation more extensively and I will attempt to roll back to current rig.

 

Also of note,

when I disengaged network lock I was able to connect to all servers.

(all internet functions are running normally for me, other then ability to connect to some servers

 with NL on. non-vpn'd function is 5/5 so its not the FW rules issues that others have dealt with)

 

thank you.



#9 LZ1

LZ1

    It's nice to be nice to nice people

  • Moderators
  • 1888 posts

Posted 21 July 2018 - 09:23 PM

I Also am having what I believe to be the same issue.

I am running an older version not updated at all to a recent version,

Only able to connect to about 40% of the servers.

I'm assuming the other 60% are being changed, updated, upgraded or in some way modified

as part of modernization ?

 

Has Dabih, for example received any new programing in the last 2 / 3 weeks ?

Curious for curiosity sake.

 

I will be updating the airvpn installation i have on my machine with in 12 hours and hopefully at the least

I will not lose any ground and may regain ability to connect on servers I cannot now.

 

If I do not reply to this thread with in 24 hours,

upgrading has not had a positive effect and in fact has worsened the situation

in that case please investigate a corrolation more extensively and I will attempt to roll back to current rig.

 

Also of note,

when I disengaged network lock I was able to connect to all servers.

(all internet functions are running normally for me, other then ability to connect to some servers

 with NL on. non-vpn'd function is 5/5 so its not the FW rules issues that others have dealt with)

 

thank you.

If you mean to ask if there's changes being made to 60% of servers, which could be causing issues, then I can only say there would be many more posts in the forum about it :).

 

Any new changes are announced in the announcement forum. Lastly, we don't know what's going on in your case if you don't append any logs.


Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. Its Guides Section has guides on Linux/Torrenting/Blocked sites & many other topics too.
Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please read the First Questions section in the link above for more details, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Tired of Windows? Why Linux Is Better.

#10 anotherusername

anotherusername

    Member

  • Members
  • PipPip
  • 11 posts

Posted 23 July 2018 - 03:43 PM   Best Answer

Just to report: updating to the latest Eddie client appears to have resolved things and I can now connect to Dabih etc.

 

 

ps. I did try to update before my initial posts, but there was an issue installing it







Similar Topics Collapse

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Servers online. Online Sessions: 14158 - BW: 44585 Mbit/sYour IP: 3.80.177.176Guest Access.