16-11-22 17:21:13 Session is ACTIVE 2016-11-22 17:21:13 EVENT: GET_CONFIG 2016-11-22 17:21:13 Sending PUSH_REQUEST to server... 2016-11-22 17:21:14 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:21:14 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:21:14 EVENT: ASSIGN_IP 2016-11-22 17:21:14 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:21:14 Connected via tun 2016-11-22 17:21:14 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:21:14 LZO-ASYM init swap=0 asym=1 2016-11-22 17:21:14 Comp-stub init swap=0 2016-11-22 17:21:14 SetStatus Connected 2016-11-22 17:24:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:24:16 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:24:16 EVENT: PAUSE 2016-11-22 17:24:17 RESUME TEST: ReachableViaWiFi 2016-11-22 17:24:17 EVENT: RESUME 2016-11-22 17:24:17 EVENT: RECONNECTING 2016-11-22 17:24:17 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:24:17 EVENT: WAIT 2016-11-22 17:24:17 SetTunnelSocket returned 1 2016-11-22 17:24:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:24:17 EVENT: CONNECTING 2016-11-22 17:24:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:24:17 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:24:17 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:24:17 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:24:17 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:24:18 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:24:18 Session is ACTIVE 2016-11-22 17:24:18 EVENT: GET_CONFIG 2016-11-22 17:24:18 Sending PUSH_REQUEST to server... 2016-11-22 17:24:19 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:24:19 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:24:19 EVENT: ASSIGN_IP 2016-11-22 17:24:19 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:24:19 Connected via tun 2016-11-22 17:24:19 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:24:19 LZO-ASYM init swap=0 asym=1 2016-11-22 17:24:19 Comp-stub init swap=0 2016-11-22 17:24:19 SetStatus Connected 2016-11-22 17:24:20 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:24:20 EVENT: PAUSE 2016-11-22 17:24:21 RESUME TEST: ReachableViaWiFi 2016-11-22 17:24:21 EVENT: RESUME 2016-11-22 17:24:21 EVENT: RECONNECTING 2016-11-22 17:24:21 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:24:21 EVENT: WAIT 2016-11-22 17:24:21 SetTunnelSocket returned 1 2016-11-22 17:24:21 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:24:21 EVENT: CONNECTING 2016-11-22 17:24:21 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:24:21 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:24:21 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:24:21 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:24:23 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:24:23 Session is ACTIVE 2016-11-22 17:24:23 EVENT: GET_CONFIG 2016-11-22 17:24:23 Sending PUSH_REQUEST to server... 2016-11-22 17:24:24 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:24:24 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:24:24 TunPersist: reused tun context 2016-11-22 17:24:24 Connected via tun 2016-11-22 17:24:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:24:24 LZO-ASYM init swap=0 asym=1 2016-11-22 17:24:24 Comp-stub init swap=0 2016-11-22 17:24:24 SetStatus Connected 2016-11-22 17:24:24 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:24:28 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:24:28 EVENT: PAUSE 2016-11-22 17:24:29 RESUME TEST: ReachableViaWiFi 2016-11-22 17:24:29 EVENT: RESUME 2016-11-22 17:24:29 EVENT: RECONNECTING 2016-11-22 17:24:29 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:24:29 EVENT: WAIT 2016-11-22 17:24:29 SetTunnelSocket returned 1 2016-11-22 17:24:29 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:24:29 EVENT: CONNECTING 2016-11-22 17:24:29 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:24:29 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:24:29 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:24:29 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:24:30 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:24:30 Session is ACTIVE 2016-11-22 17:24:30 EVENT: GET_CONFIG 2016-11-22 17:24:30 Sending PUSH_REQUEST to server... 2016-11-22 17:24:31 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:24:31 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:24:31 EVENT: ASSIGN_IP 2016-11-22 17:24:31 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:24:31 Connected via tun 2016-11-22 17:24:31 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:24:31 LZO-ASYM init swap=0 asym=1 2016-11-22 17:24:31 Comp-stub init swap=0 2016-11-22 17:24:31 SetStatus Connected 2016-11-22 17:29:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:29:21 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:29:24 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:29:24 EVENT: PAUSE 2016-11-22 17:29:25 RESUME TEST: ReachableViaWiFi 2016-11-22 17:29:25 EVENT: RESUME 2016-11-22 17:29:25 EVENT: RECONNECTING 2016-11-22 17:29:25 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:29:25 EVENT: WAIT 2016-11-22 17:29:25 SetTunnelSocket returned 1 2016-11-22 17:29:25 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:29:25 EVENT: CONNECTING 2016-11-22 17:29:25 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:29:25 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:29:25 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:29:25 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:29:26 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:29:26 Session is ACTIVE 2016-11-22 17:29:26 EVENT: GET_CONFIG 2016-11-22 17:29:26 Sending PUSH_REQUEST to server... 2016-11-22 17:29:27 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:29:27 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:29:27 EVENT: ASSIGN_IP 2016-11-22 17:29:27 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:29:27 Connected via tun 2016-11-22 17:29:27 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:29:27 LZO-ASYM init swap=0 asym=1 2016-11-22 17:29:27 Comp-stub init swap=0 2016-11-22 17:29:27 SetStatus Connected 2016-11-22 17:30:00 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:30:03 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:30:03 EVENT: PAUSE 2016-11-22 17:30:04 RESUME TEST: ReachableViaWiFi 2016-11-22 17:30:04 EVENT: RESUME 2016-11-22 17:30:04 EVENT: RECONNECTING 2016-11-22 17:30:04 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:30:04 EVENT: WAIT 2016-11-22 17:30:04 SetTunnelSocket returned 1 2016-11-22 17:30:04 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:30:04 EVENT: CONNECTING 2016-11-22 17:30:04 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:30:04 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:30:04 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:30:04 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:30:05 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:30:06 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:30:06 Session is ACTIVE 2016-11-22 17:30:06 EVENT: GET_CONFIG 2016-11-22 17:30:06 Sending PUSH_REQUEST to server... 2016-11-22 17:30:06 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:30:06 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:30:06 EVENT: ASSIGN_IP 2016-11-22 17:30:06 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:30:06 Connected via tun 2016-11-22 17:30:06 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:30:06 LZO-ASYM init swap=0 asym=1 2016-11-22 17:30:06 Comp-stub init swap=0 2016-11-22 17:30:06 SetStatus Connected 2016-11-22 17:30:08 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:30:08 EVENT: PAUSE 2016-11-22 17:30:09 RESUME TEST: ReachableViaWiFi 2016-11-22 17:30:09 EVENT: RESUME 2016-11-22 17:30:09 EVENT: RECONNECTING 2016-11-22 17:30:09 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:30:09 EVENT: WAIT 2016-11-22 17:30:09 SetTunnelSocket returned 1 2016-11-22 17:30:09 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:30:09 EVENT: CONNECTING 2016-11-22 17:30:09 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:30:09 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:30:09 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:30:09 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:30:10 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:30:10 Session is ACTIVE 2016-11-22 17:30:10 EVENT: GET_CONFIG 2016-11-22 17:30:10 Sending PUSH_REQUEST to server... 2016-11-22 17:30:11 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:30:11 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:30:11 TunPersist: reused tun context 2016-11-22 17:30:11 Connected via tun 2016-11-22 17:30:11 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:30:11 LZO-ASYM init swap=0 asym=1 2016-11-22 17:30:11 Comp-stub init swap=0 2016-11-22 17:30:11 SetStatus Connected 2016-11-22 17:30:12 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 17:30:15 RECONNECT TEST: ReachableViaWiFi 2016-11-22 17:30:15 EVENT: PAUSE 2016-11-22 17:30:16 RESUME TEST: ReachableViaWiFi 2016-11-22 17:30:16 EVENT: RESUME 2016-11-22 17:30:16 EVENT: RECONNECTING 2016-11-22 17:30:16 Contacting 23.88.114.44:2018 via UDP 2016-11-22 17:30:16 EVENT: WAIT 2016-11-22 17:30:16 SetTunnelSocket returned 1 2016-11-22 17:30:16 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 17:30:16 EVENT: CONNECTING 2016-11-22 17:30:16 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 17:30:16 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 17:30:16 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 17:30:16 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 17:30:17 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 17:30:17 Session is ACTIVE 2016-11-22 17:30:17 EVENT: GET_CONFIG 2016-11-22 17:30:17 Sending PUSH_REQUEST to server... 2016-11-22 17:30:18 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 17:30:18 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 17:30:18 EVENT: ASSIGN_IP 2016-11-22 17:30:18 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 17:30:18 Connected via tun 2016-11-22 17:30:18 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 17:30:18 LZO-ASYM init swap=0 asym=1 2016-11-22 17:30:18 Comp-stub init swap=0 2016-11-22 17:30:18 SetStatus Connected 2016-11-22 17:37:06 TUN reset routes 2016-11-22 17:37:07 EVENT: DISCONNECTED 2016-11-22 17:37:07 Raw stats on disconnect: BYTES_IN : 1786098858 BYTES_OUT : 53767003 PACKETS_IN : 1267703 PACKETS_OUT : 450702 TUN_BYTES_IN : 33317054 TUN_BYTES_OUT : 1723966271 TUN_PACKETS_IN : 449600 TUN_PACKETS_OUT : 1266656 KEEPALIVE_TIMEOUT : 1 N_PAUSE : 38 N_RECONNECT : 39 2016-11-22 17:37:07 Performance stats on disconnect: CPU usage (microseconds): 167008093 Tunnel compression ratio (uplink): 1.6138 Tunnel compression ratio (downlink): 1.03604 Network bytes per CPU second: 11016626 Tunnel bytes per CPU second: 10522144 2016-11-22 17:37:07 ----- OpenVPN Stop ----- 2016-11-22 22:18:47 ----- OpenVPN Start ----- OpenVPN core 3.0.11 ios arm64 64-bit built on Apr 15 2016 14:13:50 2016-11-22 22:18:47 Frame=512/2048/512 mssfix-ctrl=1250 2016-11-22 22:18:47 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [explicit-exit-notify] [5] 2016-11-22 22:18:47 EVENT: RESOLVE 2016-11-22 22:18:47 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:18:47 EVENT: WAIT 2016-11-22 22:18:47 SetTunnelSocket returned 1 2016-11-22 22:18:47 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:18:47 EVENT: CONNECTING 2016-11-22 22:18:47 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:18:47 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:18:48 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:18:48 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:18:48 NET WiFi:ReachableViaWiFi/-R t-----d 2016-11-22 22:18:48 NET Internet:ReachableViaWiFi/-R t------ 2016-11-22 22:18:49 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:18:49 Session is ACTIVE 2016-11-22 22:18:49 EVENT: GET_CONFIG 2016-11-22 22:18:49 Sending PUSH_REQUEST to server... 2016-11-22 22:18:49 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:18:49 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:18:49 EVENT: ASSIGN_IP 2016-11-22 22:18:49 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:18:49 Connected via tun 2016-11-22 22:18:49 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:18:49 LZO-ASYM init swap=0 asym=1 2016-11-22 22:18:49 Comp-stub init swap=0 2016-11-22 22:18:50 SetStatus Connected 2016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:50:47 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:50:47 EVENT: PAUSE 2016-11-22 22:50:48 RESUME TEST: ReachableViaWiFi 2016-11-22 22:50:48 EVENT: RESUME 2016-11-22 22:50:48 EVENT: RECONNECTING 2016-11-22 22:50:48 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:50:48 EVENT: WAIT 2016-11-22 22:50:48 SetTunnelSocket returned 1 2016-11-22 22:50:48 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:50:48 EVENT: CONNECTING 2016-11-22 22:50:48 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:50:48 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:50:49 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:50:49 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:50:50 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:50:50 Session is ACTIVE 2016-11-22 22:50:50 EVENT: GET_CONFIG 2016-11-22 22:50:50 Sending PUSH_REQUEST to server... 2016-11-22 22:50:51 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:50:51 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:50:51 EVENT: ASSIGN_IP 2016-11-22 22:50:51 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:50:51 Connected via tun 2016-11-22 22:50:51 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:50:51 LZO-ASYM init swap=0 asym=1 2016-11-22 22:50:51 Comp-stub init swap=0 2016-11-22 22:50:51 SetStatus Connected 2016-11-22 22:51:19 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:51:22 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:51:22 EVENT: PAUSE 2016-11-22 22:51:23 RESUME TEST: ReachableViaWiFi 2016-11-22 22:51:23 EVENT: RESUME 2016-11-22 22:51:23 EVENT: RECONNECTING 2016-11-22 22:51:23 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:51:23 EVENT: WAIT 2016-11-22 22:51:23 SetTunnelSocket returned 1 2016-11-22 22:51:23 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:51:23 EVENT: CONNECTING 2016-11-22 22:51:23 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:51:23 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:51:23 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:51:23 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:51:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:51:24 Session is ACTIVE 2016-11-22 22:51:24 EVENT: GET_CONFIG 2016-11-22 22:51:24 Sending PUSH_REQUEST to server... 2016-11-22 22:51:25 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:51:25 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:51:25 EVENT: ASSIGN_IP 2016-11-22 22:51:25 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:51:25 Connected via tun 2016-11-22 22:51:25 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:51:25 LZO-ASYM init swap=0 asym=1 2016-11-22 22:51:25 Comp-stub init swap=0 2016-11-22 22:51:25 SetStatus Connected 2016-11-22 22:51:27 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:51:30 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:51:30 EVENT: PAUSE 2016-11-22 22:51:31 RESUME TEST: ReachableViaWiFi 2016-11-22 22:51:31 EVENT: RESUME 2016-11-22 22:51:31 EVENT: RECONNECTING 2016-11-22 22:51:31 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:51:31 EVENT: WAIT 2016-11-22 22:51:31 SetTunnelSocket returned 1 2016-11-22 22:51:31 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:51:31 EVENT: CONNECTING 2016-11-22 22:51:31 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:51:31 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:51:31 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:51:31 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:51:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:51:32 Session is ACTIVE 2016-11-22 22:51:32 EVENT: GET_CONFIG 2016-11-22 22:51:32 Sending PUSH_REQUEST to server... 2016-11-22 22:51:33 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:51:33 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:51:33 EVENT: ASSIGN_IP 2016-11-22 22:51:33 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:51:33 Connected via tun 2016-11-22 22:51:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:51:33 LZO-ASYM init swap=0 asym=1 2016-11-22 22:51:33 Comp-stub init swap=0 2016-11-22 22:51:33 SetStatus Connected 2016-11-22 22:51:37 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:51:40 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:51:40 EVENT: PAUSE 2016-11-22 22:51:41 RESUME TEST: ReachableViaWiFi 2016-11-22 22:51:41 EVENT: RESUME 2016-11-22 22:51:41 EVENT: RECONNECTING 2016-11-22 22:51:41 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:51:41 EVENT: WAIT 2016-11-22 22:51:41 SetTunnelSocket returned 1 2016-11-22 22:51:41 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:51:41 EVENT: CONNECTING 2016-11-22 22:51:41 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:51:41 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:51:41 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:51:41 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:51:45 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:51:45 Session is ACTIVE 2016-11-22 22:51:45 EVENT: GET_CONFIG 2016-11-22 22:51:45 Sending PUSH_REQUEST to server... 2016-11-22 22:51:46 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:51:46 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:51:46 EVENT: ASSIGN_IP 2016-11-22 22:51:46 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:51:46 Connected via tun 2016-11-22 22:51:46 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:51:46 LZO-ASYM init swap=0 asym=1 2016-11-22 22:51:46 Comp-stub init swap=0 2016-11-22 22:51:46 SetStatus Connected 2016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:53:09 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:53:09 EVENT: PAUSE 2016-11-22 22:53:10 RESUME TEST: ReachableViaWiFi 2016-11-22 22:53:10 EVENT: RESUME 2016-11-22 22:53:10 EVENT: RECONNECTING 2016-11-22 22:53:10 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:53:10 EVENT: WAIT 2016-11-22 22:53:10 SetTunnelSocket returned 1 2016-11-22 22:53:10 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:53:11 EVENT: CONNECTING 2016-11-22 22:53:11 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:53:11 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:53:11 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:53:11 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:53:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:53:12 Session is ACTIVE 2016-11-22 22:53:12 EVENT: GET_CONFIG 2016-11-22 22:53:12 Sending PUSH_REQUEST to server... 2016-11-22 22:53:13 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:53:13 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:53:13 EVENT: ASSIGN_IP 2016-11-22 22:53:13 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:53:13 Connected via tun 2016-11-22 22:53:13 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:53:13 LZO-ASYM init swap=0 asym=1 2016-11-22 22:53:13 Comp-stub init swap=0 2016-11-22 22:53:13 SetStatus Connected 2016-11-22 22:58:03 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:58:06 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:58:06 EVENT: PAUSE 2016-11-22 22:58:07 RESUME TEST: ReachableViaWiFi 2016-11-22 22:58:07 EVENT: RESUME 2016-11-22 22:58:07 EVENT: RECONNECTING 2016-11-22 22:58:07 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:58:07 EVENT: WAIT 2016-11-22 22:58:07 SetTunnelSocket returned 1 2016-11-22 22:58:07 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:58:08 EVENT: CONNECTING 2016-11-22 22:58:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:58:08 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:58:08 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:58:08 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:58:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:58:09 Session is ACTIVE 2016-11-22 22:58:09 EVENT: GET_CONFIG 2016-11-22 22:58:09 Sending PUSH_REQUEST to server... 2016-11-22 22:58:10 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:58:10 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:58:10 EVENT: ASSIGN_IP 2016-11-22 22:58:10 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:58:10 Connected via tun 2016-11-22 22:58:10 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:58:10 LZO-ASYM init swap=0 asym=1 2016-11-22 22:58:10 Comp-stub init swap=0 2016-11-22 22:58:10 SetStatus Connected 2016-11-22 22:58:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:58:16 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:58:16 EVENT: PAUSE 2016-11-22 22:58:17 RESUME TEST: ReachableViaWiFi 2016-11-22 22:58:17 EVENT: RESUME 2016-11-22 22:58:17 EVENT: RECONNECTING 2016-11-22 22:58:17 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:58:17 EVENT: WAIT 2016-11-22 22:58:17 SetTunnelSocket returned 1 2016-11-22 22:58:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:58:17 EVENT: CONNECTING 2016-11-22 22:58:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:58:17 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:58:17 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:58:17 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:58:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-22 22:58:23 RECONNECT TEST: ReachableViaWiFi 2016-11-22 22:58:23 EVENT: PAUSE 2016-11-22 22:58:24 RESUME TEST: ReachableViaWiFi 2016-11-22 22:58:24 EVENT: RESUME 2016-11-22 22:58:24 EVENT: RECONNECTING 2016-11-22 22:58:24 Contacting 23.88.114.44:2018 via UDP 2016-11-22 22:58:24 EVENT: WAIT 2016-11-22 22:58:24 SetTunnelSocket returned 1 2016-11-22 22:58:24 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-22 22:58:24 EVENT: CONNECTING 2016-11-22 22:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 22:58:24 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 22:58:24 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 22:58:24 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 22:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 22:58:25 Session is ACTIVE 2016-11-22 22:58:25 EVENT: GET_CONFIG 2016-11-22 22:58:25 Sending PUSH_REQUEST to server... 2016-11-22 22:58:26 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-22 22:58:26 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-22 22:58:26 EVENT: ASSIGN_IP 2016-11-22 22:58:26 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-22 22:58:26 Connected via tun 2016-11-22 22:58:26 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-22 22:58:26 LZO-ASYM init swap=0 asym=1 2016-11-22 22:58:26 Comp-stub init swap=0 2016-11-22 22:58:26 SetStatus Connected 2016-11-22 23:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-22 23:58:24 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-22 23:58:24 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-22 23:58:24 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-22 23:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-22 23:58:25 LZO-ASYM init swap=0 asym=1 2016-11-22 23:58:25 Comp-stub init swap=0 2016-11-23 00:14:26 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-23 00:14:29 RECONNECT TEST: ReachableViaWiFi 2016-11-23 00:14:29 EVENT: PAUSE 2016-11-23 00:14:30 RESUME TEST: ReachableViaWiFi 2016-11-23 00:14:30 EVENT: RESUME 2016-11-23 00:14:30 EVENT: RECONNECTING 2016-11-23 00:14:30 Contacting 23.88.114.44:2018 via UDP 2016-11-23 00:14:30 EVENT: WAIT 2016-11-23 00:14:30 SetTunnelSocket returned 1 2016-11-23 00:14:30 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-23 00:14:30 EVENT: CONNECTING 2016-11-23 00:14:30 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-23 00:14:30 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-23 00:14:30 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-23 00:14:30 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-23 00:14:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-23 00:14:32 Session is ACTIVE 2016-11-23 00:14:32 EVENT: GET_CONFIG 2016-11-23 00:14:32 Sending PUSH_REQUEST to server... 2016-11-23 00:14:33 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-23 00:14:33 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-23 00:14:33 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-23 00:14:33 EVENT: ASSIGN_IP 2016-11-23 00:14:33 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-23 00:14:33 Connected via tun 2016-11-23 00:14:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-23 00:14:33 LZO-ASYM init swap=0 asym=1 2016-11-23 00:14:33 Comp-stub init swap=0 2016-11-23 00:14:33 SetStatus Connected 2016-11-23 00:14:36 RECONNECT TEST: ReachableViaWiFi 2016-11-23 00:14:36 EVENT: PAUSE 2016-11-23 00:14:37 RESUME TEST: ReachableViaWiFi 2016-11-23 00:14:37 EVENT: RESUME 2016-11-23 00:14:37 EVENT: RECONNECTING 2016-11-23 00:14:37 Contacting 23.88.114.44:2018 via UDP 2016-11-23 00:14:37 EVENT: WAIT 2016-11-23 00:14:37 SetTunnelSocket returned 1 2016-11-23 00:14:37 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-23 00:14:37 EVENT: CONNECTING 2016-11-23 00:14:37 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-23 00:14:37 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-23 00:14:37 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-23 00:14:37 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-23 00:14:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-23 00:14:38 Session is ACTIVE 2016-11-23 00:14:38 EVENT: GET_CONFIG 2016-11-23 00:14:38 Sending PUSH_REQUEST to server... 2016-11-23 00:14:39 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-23 00:14:39 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-23 00:14:39 TunPersist: reused tun context 2016-11-23 00:14:39 Connected via tun 2016-11-23 00:14:39 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-23 00:14:39 LZO-ASYM init swap=0 asym=1 2016-11-23 00:14:39 Comp-stub init swap=0 2016-11-23 00:14:39 SetStatus Connected 2016-11-23 00:31:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-23 00:31:16 RECONNECT TEST: ReachableViaWiFi 2016-11-23 00:31:16 EVENT: PAUSE 2016-11-23 00:31:17 RESUME TEST: ReachableViaWiFi 2016-11-23 00:31:17 EVENT: RESUME 2016-11-23 00:31:17 EVENT: RECONNECTING 2016-11-23 00:31:17 Contacting 23.88.114.44:2018 via UDP 2016-11-23 00:31:17 EVENT: WAIT 2016-11-23 00:31:17 SetTunnelSocket returned 1 2016-11-23 00:31:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-23 00:31:17 EVENT: CONNECTING 2016-11-23 00:31:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-23 00:31:17 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-23 00:31:17 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-23 00:31:17 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-23 00:31:18 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi 2016-11-23 00:31:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-23 00:31:19 Session is ACTIVE 2016-11-23 00:31:19 EVENT: GET_CONFIG 2016-11-23 00:31:19 Sending PUSH_REQUEST to server... 2016-11-23 00:31:20 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-23 00:31:20 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-23 00:31:20 EVENT: ASSIGN_IP 2016-11-23 00:31:20 TunPersist: saving tun context: Session Name: 23.88.114.44 Layer: OSI_LAYER_3 Remote Address: 23.88.114.44 Tunnel Addresses: 10.30.0.41/16 -> 10.30.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.0.1 Search Domains: 2016-11-23 00:31:20 Connected via tun 2016-11-23 00:31:20 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-23 00:31:20 LZO-ASYM init swap=0 asym=1 2016-11-23 00:31:20 Comp-stub init swap=0 2016-11-23 00:31:20 SetStatus Connected 2016-11-23 00:31:21 RECONNECT TEST: ReachableViaWiFi 2016-11-23 00:31:21 EVENT: PAUSE 2016-11-23 00:31:22 RESUME TEST: ReachableViaWiFi 2016-11-23 00:31:22 EVENT: RESUME 2016-11-23 00:31:22 EVENT: RECONNECTING 2016-11-23 00:31:22 Contacting 23.88.114.44:2018 via UDP 2016-11-23 00:31:22 EVENT: WAIT 2016-11-23 00:31:22 SetTunnelSocket returned 1 2016-11-23 00:31:22 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 2016-11-23 00:31:22 EVENT: CONNECTING 2016-11-23 00:31:22 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-11-23 00:31:22 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 IV_VER=3.0.11 IV_PLAT=ios IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 2016-11-23 00:31:22 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-11-23 00:31:22 VERIFY OK: depth=0 cert. version : 3 serial number : 01:0F issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2016-03-10 08:48:14 expires on : 2026-03-08 08:48:14 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-11-23 00:31:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2016-11-23 00:31:24 Session is ACTIVE 2016-11-23 00:31:24 EVENT: GET_CONFIG 2016-11-23 00:31:24 Sending PUSH_REQUEST to server... 2016-11-23 00:31:24 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.30.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.30.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.30.0.41] [255.255.0.0] 2016-11-23 00:31:24 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA1 compress: LZO_STUB peer ID: -1 2016-11-23 00:31:24 TunPersist: reused tun context 2016-11-23 00:31:24 Connected via tun 2016-11-23 00:31:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ 2016-11-23 00:31:24 LZO-ASYM init swap=0 asym=1 2016-11-23 00:31:24 Comp-stub init swap=0 2016-11-23 00:31:24 SetStatus Connected Sent from my iPad