Mon Jul 06 12:11:01 2020 OpenVPN 2.5_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 23 2019 Mon Jul 06 12:11:01 2020 Windows version 6.1 (Windows 7) 64bit Mon Jul 06 12:11:01 2020 library versions: OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10 Enter Management Password: Mon Jul 06 12:11:01 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Mon Jul 06 12:11:01 2020 Need hold release from management interface, waiting... Mon Jul 06 12:11:02 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'state on' Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'log all on' Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'echo all on' Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'bytecount 5' Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'hold off' Mon Jul 06 12:11:02 2020 MANAGEMENT: CMD 'hold release' Mon Jul 06 12:11:02 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 06 12:11:02 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 06 12:11:02 2020 MANAGEMENT: >STATE:1594030262,RESOLVE,,,,,, Mon Jul 06 12:11:02 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.164:443 Mon Jul 06 12:11:02 2020 Socket Buffers: R=[8192->262144] S=[8192->262144] Mon Jul 06 12:11:02 2020 UDP link local: (not bound) Mon Jul 06 12:11:02 2020 UDP link remote: [AF_INET]213.152.161.164:443 Mon Jul 06 12:11:02 2020 MANAGEMENT: >STATE:1594030262,WAIT,,,,,, Mon Jul 06 12:11:02 2020 MANAGEMENT: >STATE:1594030262,AUTH,,,,,, Mon Jul 06 12:11:02 2020 TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=07cb78a6 0e482efd Mon Jul 06 12:11:02 2020 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Jul 06 12:11:02 2020 VERIFY KU OK Mon Jul 06 12:11:02 2020 Validating certificate extended key usage Mon Jul 06 12:11:02 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Jul 06 12:11:02 2020 VERIFY EKU OK Mon Jul 06 12:11:02 2020 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diphda, emailAddress=info@airvpn.org Mon Jul 06 12:11:02 2020 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mon Jul 06 12:11:02 2020 [Diphda] Peer Connection Initiated with [AF_INET]213.152.161.164:443 Mon Jul 06 12:11:03 2020 MANAGEMENT: >STATE:1594030263,GET_CONFIG,,,,,, Mon Jul 06 12:11:03 2020 SENT CONTROL [Diphda]: 'PUSH_REQUEST' (status=1) Mon Jul 06 12:11:03 2020 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.208.1,tun-ipv6,route-gateway 10.15.208.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bd0::108e/64 fde6:7a:7d20:bd0::1,ifconfig 10.15.208.144 255.255.255.0,peer-id 0,cipher AES-256-GCM' Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: timers and/or timeouts modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: compression parms modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: --ifconfig/up options modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: route options modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: route-related options modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: peer-id set Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: adjusting link_mtu to 1625 Mon Jul 06 12:11:03 2020 OPTIONS IMPORT: data channel crypto options modified Mon Jul 06 12:11:03 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Mon Jul 06 12:11:03 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Jul 06 12:11:03 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Jul 06 12:11:03 2020 interactive service msg_channel=0 Mon Jul 06 12:11:03 2020 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=11 HWADDR=00:1c:c0:8e:ca:6f Mon Jul 06 12:11:03 2020 GDG6: remote_host_ipv6=n/a Mon Jul 06 12:11:03 2020 GetBestInterfaceEx() returned if=11 Mon Jul 06 12:11:03 2020 GDG6: II=11 DP=::/0 NH=fe80::e69e:12ff:fe85:ba94 Mon Jul 06 12:11:03 2020 GDG6: Metric=256, Loopback=0, AA=1, I=0 Mon Jul 06 12:11:03 2020 ROUTE6_GATEWAY fe80::e69e:12ff:fe85:ba94 I=11 Mon Jul 06 12:11:03 2020 open_tun Mon Jul 06 12:11:03 2020 TAP-WIN32 device [Local Area Connection 2] opened Mon Jul 06 12:11:03 2020 TAP-Windows Driver Version 9.21 Mon Jul 06 12:11:03 2020 Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.208.0/10.15.208.144/255.255.255.0 [SUCCEEDED] Mon Jul 06 12:11:03 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.208.144/255.255.255.0 on interface {35D93CA6-F63B-4E62-A93C-B2535EBCFFF2} [DHCP-serv: 10.15.208.254, lease-time: 31536000] Mon Jul 06 12:11:03 2020 NOTE: FlushIpNetTable failed on interface [26] Access is denied. (status=5) : Access is denied. Mon Jul 06 12:11:03 2020 MANAGEMENT: >STATE:1594030263,ASSIGN_IP,,10.15.208.144,,,,,fde6:7a:7d20:bd0::108e Mon Jul 06 12:11:04 2020 NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=26 fde6:7a:7d20:bd0::108e store=active Mon Jul 06 12:11:05 2020 ERROR: netsh command failed: returned error code 1 Mon Jul 06 12:11:10 2020 NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=26 fde6:7a:7d20:bd0::108e store=active Mon Jul 06 12:11:10 2020 ERROR: netsh command failed: returned error code 1 Mon Jul 06 12:11:15 2020 NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=26 fde6:7a:7d20:bd0::108e store=active Mon Jul 06 12:11:15 2020 ERROR: netsh command failed: returned error code 1 Mon Jul 06 12:11:20 2020 NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=26 fde6:7a:7d20:bd0::108e store=active Mon Jul 06 12:11:20 2020 ERROR: netsh command failed: returned error code 1 Mon Jul 06 12:11:24 2020 MANAGEMENT: Client disconnected Mon Jul 06 12:11:24 2020 NETSH: command failed Mon Jul 06 12:11:24 2020 Exiting due to fatal error