! 2020.03.28 11:49:14 - Connecting to Kitalpha (Switzerland, Zurich) . 2020.03.28 11:49:15 - Routes, added a new route, 91.214.169.70 for gateway 192.168.0.1 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: Reading configuration from file C:\Users\Phil\AppData\Local\AirVPN\610163f64c9b19a3253babe3a8dc0339c36546c60a3bff6bd622b0bf8b2f8d71.tmp.ssl . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: UTF-8 byte order mark detected . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[ui]: Initializing service [openvpn] . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[ui]: Configuration successful . 2020.03.28 11:49:15 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2020.03.28 11:49:15 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.03.28 11:49:15 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.03.28 11:49:15 - Connection to OpenVPN Management Interface . 2020.03.28 11:49:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.03.28 11:49:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.03.28 11:49:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.03.28 11:49:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:6771 . 2020.03.28 11:49:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.03.28 11:49:15 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:6771 [nonblock] . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58246 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: s_connect: connecting 91.214.169.70:28439 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[0]: s_connect: connected 91.214.169.70:28439 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.74:58247 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: SNI: sending servername: 91.214.169.70 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: Peer certificate not required . 2020.03.28 11:49:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: Certificate verification disabled . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: Client certificate not requested . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: TLS connected: new session negotiated . 2020.03.28 11:49:15 - SSL > 2020.03.28 11:49:15 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2020.03.28 11:49:16 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:6771 . 2020.03.28 11:49:16 - OpenVPN > TCP_CLIENT link local: (not bound) . 2020.03.28 11:49:16 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:6771 . 2020.03.28 11:49:16 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:6771, sid=365e7b89 c0285f9e . 2020.03.28 11:49:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.03.28 11:49:16 - OpenVPN > VERIFY KU OK . 2020.03.28 11:49:16 - OpenVPN > Validating certificate extended key usage . 2020.03.28 11:49:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.03.28 11:49:16 - OpenVPN > VERIFY EKU OK . 2020.03.28 11:49:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2020.03.28 11:49:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.03.28 11:49:16 - OpenVPN > [Kitalpha] Peer Connection Initiated with [AF_INET]127.0.0.1:6771 . 2020.03.28 11:49:18 - OpenVPN > SENT CONTROL [Kitalpha]: 'PUSH_REQUEST' (status=1) . 2020.03.28 11:49:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.9.1,route-gateway 10.20.9.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.9.16 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.03.28 11:49:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2020.03.28 11:49:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.03.28 11:49:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.03.28 11:49:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.28 11:49:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.28 11:49:18 - OpenVPN > interactive service msg_channel=0 . 2020.03.28 11:49:18 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=04:d4:c4:23:ec:cb . 2020.03.28 11:49:18 - OpenVPN > open_tun . 2020.03.28 11:49:18 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{DDDF99A5-10CB-4444-9CB8-2A84E79ED9CA}.tap . 2020.03.28 11:49:18 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.03.28 11:49:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.9.0/10.20.9.16/255.255.255.0 [SUCCEEDED] . 2020.03.28 11:49:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.9.16/255.255.255.0 on interface {DDDF99A5-10CB-4444-9CB8-2A84E79ED9CA} [DHCP-serv: 10.20.9.254, lease-time: 31536000] . 2020.03.28 11:49:18 - OpenVPN > Successful ARP Flush on interface [20] {DDDF99A5-10CB-4444-9CB8-2A84E79ED9CA} . 2020.03.28 11:49:18 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.03.28 11:49:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.03.28 11:49:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2020.03.28 11:49:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.28 11:49:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.28 11:49:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.9.1 . 2020.03.28 11:49:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.28 11:49:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.9.1 . 2020.03.28 11:49:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.28 11:49:23 - Interface Ethernet 3 metric changed from 1 to 3, layer IPv4 . 2020.03.28 11:49:23 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2020.03.28 11:49:23 - DNS leak protection with packet filtering enabled. . 2020.03.28 11:49:23 - DNS IPv4 of a network adapter forced (Ethernet 3, from manual (10.50.0.1) to 10.20.9.1) . 2020.03.28 11:49:24 - Routes, added a new route, 91.214.169.69 for gateway 10.20.9.1 . 2020.03.28 11:49:24 - Flushing DNS I 2020.03.28 11:49:27 - Checking route IPv4 ! 2020.03.28 11:49:27 - Connected. . 2020.03.28 11:49:27 - OpenVPN > Initialization Sequence Completed . 2020.03.28 11:50:15 - SSL > 2020.03.28 11:50:15 LOG6[cron]: Executing cron jobs . 2020.03.28 11:50:15 - SSL > 2020.03.28 11:50:15 LOG6[cron]: Cron jobs completed in 0 seconds