. 2020.07.12 00:07:00 - Above log line repeated 1 times more . 2020.07.12 00:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 00:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 00:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 00:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 00:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 00:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 00:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 00:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 00:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 00:10:20 - Collect information about AirVPN completed . 2020.07.12 01:06:59 - Above log line repeated 1 times more . 2020.07.12 01:06:59 - Renewing TLS key . 2020.07.12 01:06:59 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.12 01:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=124615038/-1 pkts=272275/0 . 2020.07.12 01:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 01:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 01:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 01:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 01:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 01:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 01:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 01:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 01:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 01:10:23 - Collect information about AirVPN completed . 2020.07.12 02:07:00 - Above log line repeated 1 times more . 2020.07.12 02:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=200973179/-1 pkts=378873/0 . 2020.07.12 02:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 02:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 02:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 02:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 02:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 02:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 02:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 02:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 02:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 02:10:24 - Collect information about AirVPN completed . 2020.07.12 03:07:00 - Above log line repeated 1 times more . 2020.07.12 03:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=151710728/-1 pkts=323867/0 . 2020.07.12 03:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 03:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 03:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 03:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 03:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 03:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 03:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 03:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 03:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 03:10:24 - Collect information about AirVPN completed . 2020.07.12 04:07:00 - Above log line repeated 1 times more . 2020.07.12 04:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=149860422/-1 pkts=313852/0 . 2020.07.12 04:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 04:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 04:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 04:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 04:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 04:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 04:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 04:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 04:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 04:10:26 - Collect information about AirVPN completed . 2020.07.12 05:07:00 - Above log line repeated 1 times more . 2020.07.12 05:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=949265089/-1 pkts=1372678/0 . 2020.07.12 05:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 05:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 05:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 05:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 05:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 05:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 05:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 05:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 05:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 05:10:38 - Collect information about AirVPN completed . 2020.07.12 06:07:00 - Above log line repeated 1 times more . 2020.07.12 06:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=900492352/-1 pkts=1324826/0 . 2020.07.12 06:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 06:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 06:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 06:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 06:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 06:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 06:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 06:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 06:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 06:10:43 - Collect information about AirVPN completed . 2020.07.12 07:07:00 - Above log line repeated 1 times more . 2020.07.12 07:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=760881404/-1 pkts=1147238/0 . 2020.07.12 07:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 07:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 07:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 07:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 07:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 07:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 07:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 07:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 07:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 07:10:47 - Collect information about AirVPN completed . 2020.07.12 08:07:00 - Above log line repeated 1 times more . 2020.07.12 08:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=30741411/-1 pkts=121149/0 . 2020.07.12 08:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 08:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 08:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 08:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 08:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 08:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 08:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 08:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 08:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 08:10:52 - Collect information about AirVPN completed . 2020.07.12 09:07:00 - Above log line repeated 1 times more . 2020.07.12 09:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=29896655/-1 pkts=117399/0 . 2020.07.12 09:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 09:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 09:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 09:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 09:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 09:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 09:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 09:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 09:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 09:10:56 - Collect information about AirVPN completed . 2020.07.12 10:07:00 - Above log line repeated 1 times more . 2020.07.12 10:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=23982404/-1 pkts=93817/0 . 2020.07.12 10:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 10:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 10:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 10:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 10:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 10:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 10:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 10:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 10:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 10:11:01 - Collect information about AirVPN completed . 2020.07.12 11:07:00 - Above log line repeated 1 times more . 2020.07.12 11:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=27303628/-1 pkts=107026/0 . 2020.07.12 11:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 11:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 11:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 11:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 11:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 11:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 11:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 11:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 11:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 11:11:06 - Collect information about AirVPN completed . 2020.07.12 12:07:00 - Above log line repeated 1 times more . 2020.07.12 12:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=23937672/-1 pkts=96611/0 . 2020.07.12 12:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 12:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 12:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 12:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 12:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 12:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 12:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 12:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 12:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 12:11:11 - Collect information about AirVPN completed . 2020.07.12 13:07:00 - Above log line repeated 1 times more . 2020.07.12 13:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=29236900/-1 pkts=103051/0 . 2020.07.12 13:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 13:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 13:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 13:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 13:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 13:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 13:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 13:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 13:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 13:11:17 - Collect information about AirVPN completed . 2020.07.12 14:07:00 - Above log line repeated 1 times more . 2020.07.12 14:07:00 - OpenVPN > TLS: soft reset sec=0 bytes=22480209/-1 pkts=83658/0 . 2020.07.12 14:07:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 14:07:00 - OpenVPN > VERIFY KU OK . 2020.07.12 14:07:00 - OpenVPN > Validating certificate extended key usage . 2020.07.12 14:07:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 14:07:00 - OpenVPN > VERIFY EKU OK . 2020.07.12 14:07:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 14:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 14:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 14:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 14:11:22 - Collect information about AirVPN completed . 2020.07.12 15:07:00 - Above log line repeated 1 times more . 2020.07.12 15:07:00 - Renewing TLS key . 2020.07.12 15:07:00 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.12 15:07:04 - OpenVPN > TLS: soft reset sec=0 bytes=26967644/-1 pkts=97550/0 . 2020.07.12 15:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 15:07:04 - OpenVPN > VERIFY KU OK . 2020.07.12 15:07:04 - OpenVPN > Validating certificate extended key usage . 2020.07.12 15:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 15:07:04 - OpenVPN > VERIFY EKU OK . 2020.07.12 15:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 15:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 15:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 15:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 15:11:28 - Collect information about AirVPN completed . 2020.07.12 16:07:04 - Above log line repeated 1 times more . 2020.07.12 16:07:04 - OpenVPN > TLS: soft reset sec=0 bytes=24312626/-1 pkts=92900/0 . 2020.07.12 16:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 16:07:04 - OpenVPN > VERIFY KU OK . 2020.07.12 16:07:04 - OpenVPN > Validating certificate extended key usage . 2020.07.12 16:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 16:07:04 - OpenVPN > VERIFY EKU OK . 2020.07.12 16:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 16:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 16:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 16:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 16:11:34 - Collect information about AirVPN completed . 2020.07.12 17:07:04 - Above log line repeated 1 times more . 2020.07.12 17:07:04 - OpenVPN > TLS: soft reset sec=0 bytes=24692839/-1 pkts=90488/0 . 2020.07.12 17:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 17:07:04 - OpenVPN > VERIFY KU OK . 2020.07.12 17:07:04 - OpenVPN > Validating certificate extended key usage . 2020.07.12 17:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 17:07:04 - OpenVPN > VERIFY EKU OK . 2020.07.12 17:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 17:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 17:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 17:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 17:11:38 - Collect information about AirVPN completed . 2020.07.12 18:07:04 - Above log line repeated 1 times more . 2020.07.12 18:07:04 - OpenVPN > TLS: soft reset sec=0 bytes=23138748/-1 pkts=86777/0 . 2020.07.12 18:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 18:07:04 - OpenVPN > VERIFY KU OK . 2020.07.12 18:07:04 - OpenVPN > Validating certificate extended key usage . 2020.07.12 18:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 18:07:04 - OpenVPN > VERIFY EKU OK . 2020.07.12 18:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 18:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 18:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 18:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 18:11:41 - Collect information about AirVPN completed . 2020.07.12 19:07:04 - Above log line repeated 1 times more . 2020.07.12 19:07:04 - OpenVPN > TLS: soft reset sec=0 bytes=18457991/-1 pkts=67992/0 . 2020.07.12 19:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 19:07:04 - OpenVPN > VERIFY KU OK . 2020.07.12 19:07:04 - OpenVPN > Validating certificate extended key usage . 2020.07.12 19:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 19:07:04 - OpenVPN > VERIFY EKU OK . 2020.07.12 19:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2020.07.12 19:07:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 19:07:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 19:07:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 19:11:48 - Collect information about AirVPN completed . 2020.07.12 19:32:46 - OpenVPN > [Regulus] Inactivity timeout (--ping-restart), restarting . 2020.07.12 19:32:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2020.07.12 19:32:46 - OpenVPN > Restart pause, 5 second(s) ! 2020.07.12 19:32:46 - Disconnecting . 2020.07.12 19:32:46 - Elevated: Command:route . 2020.07.12 19:32:46 - Routes, removed a route previously added, 184.75.221.35 for gateway 10.28.6.1 . 2020.07.12 19:32:46 - Elevated: Command:route . 2020.07.12 19:32:47 - Routes, removed a route previously added, 2606:6080:1001:e:2e9c:bad5:dbdd:84ea for gateway fde6:7a:7d20:1806::1 . 2020.07.12 19:32:47 - Sending soft termination signal . 2020.07.12 19:32:47 - Elevated: Command:kill . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.37 MASK 255.255.255.255 192.168.1.1 . 2020.07.12 19:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.28.6.1 . 2020.07.12 19:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.28.6.1 . 2020.07.12 19:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.07.12 19:32:51 - OpenVPN > delete_route_ipv6(::/3) . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=4 fe80::8 store=active . 2020.07.12 19:32:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:32:51 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=4 fe80::8 store=active . 2020.07.12 19:32:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:32:51 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=4 fe80::8 store=active . 2020.07.12 19:32:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:32:51 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=4 fe80::8 store=active . 2020.07.12 19:32:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:32:51 - OpenVPN > Closing TUN/TAP interface . 2020.07.12 19:32:51 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1806::/64) . 2020.07.12 19:32:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1806::/64 interface=4 fe80::8 store=active . 2020.07.12 19:32:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection 2 fde6:7a:7d20:1806::108e store=active . 2020.07.12 19:32:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection 2 all . 2020.07.12 19:32:53 - OpenVPN > TAP: DHCP address released . 2020.07.12 19:32:53 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2020.07.12 19:32:53 - Connection terminated. . 2020.07.12 19:32:53 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2020.07.12 19:32:54 - Elevated: Command:windows-dns . 2020.07.12 19:32:54 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2020.07.12 19:32:54 - Elevated: Command:wfp . 2020.07.12 19:32:54 - Above log line repeated 5 times more . 2020.07.12 19:32:54 - DNS leak protection with packet filtering disabled. . 2020.07.12 19:32:54 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2020.07.12 19:32:54 - Elevated: Command:set-interface-metric . 2020.07.12 19:32:54 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2020.07.12 19:32:54 - Elevated: Command:set-interface-metric . 2020.07.12 19:32:54 - Elevated: Command:wfp . 2020.07.12 19:32:57 - Above log line repeated 11 times more . 2020.07.12 19:32:57 - Waiting for latency tests (242 to go) . 2020.07.12 19:32:58 - Waiting for latency tests (237 to go) . 2020.07.12 19:33:02 - Waiting for latency tests (223 to go) . 2020.07.12 19:33:03 - Waiting for latency tests (222 to go) . 2020.07.12 19:33:04 - Waiting for latency tests (217 to go) . 2020.07.12 19:33:05 - Waiting for latency tests (193 to go) . 2020.07.12 19:33:07 - Waiting for latency tests (192 to go) . 2020.07.12 19:33:08 - Waiting for latency tests (169 to go) . 2020.07.12 19:33:10 - Waiting for latency tests (168 to go) . 2020.07.12 19:33:11 - Waiting for latency tests (167 to go) . 2020.07.12 19:33:14 - Waiting for latency tests (158 to go) . 2020.07.12 19:33:17 - Waiting for latency tests (136 to go) . 2020.07.12 19:33:20 - Waiting for latency tests (86 to go) . 2020.07.12 19:33:24 - Waiting for latency tests (77 to go) . 2020.07.12 19:33:27 - Waiting for latency tests (60 to go) . 2020.07.12 19:33:28 - Waiting for latency tests (55 to go) . 2020.07.12 19:33:30 - Waiting for latency tests (31 to go) . 2020.07.12 19:33:33 - Waiting for latency tests (21 to go) . 2020.07.12 19:33:36 - Waiting for latency tests (3 to go) I 2020.07.12 19:33:38 - Checking authorization ... ! 2020.07.12 19:33:39 - Connecting to Enif (Canada, Toronto, Ontario) . 2020.07.12 19:33:39 - Elevated: Command:wfp . 2020.07.12 19:33:39 - Above log line repeated 5 times more . 2020.07.12 19:33:39 - Elevated: Command:process_openvpn . 2020.07.12 19:33:39 - OpenVPN > OpenVPN 2.4.9 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 16 2020 . 2020.07.12 19:33:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.07.12 19:33:39 - OpenVPN > library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10 . 2020.07.12 19:33:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.07.12 19:33:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.07.12 19:33:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.07.12 19:33:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.07.12 19:33:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2020.07.12 19:33:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.07.12 19:33:39 - OpenVPN > UDP link local: (not bound) . 2020.07.12 19:33:39 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2020.07.12 19:33:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=e0659449 87b37a83 . 2020.07.12 19:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 19:33:39 - OpenVPN > VERIFY KU OK . 2020.07.12 19:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.12 19:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 19:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.12 19:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.12 19:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 19:33:40 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2020.07.12 19:33:41 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1) . 2020.07.12 19:33:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.70.1,dhcp-option DNS6 fde6:7a:7d20:c46::1,tun-ipv6,route-gateway 10.16.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c46::103a/64 fde6:7a:7d20:c46::1,ifconfig 10.16.70.60 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2020.07.12 19:33:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.07.12 19:33:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.07.12 19:33:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.07.12 19:33:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 19:33:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 19:33:41 - OpenVPN > interactive service msg_channel=0 . 2020.07.12 19:33:41 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=25 HWADDR=78:2b:cb:a6:9d:cd . 2020.07.12 19:33:41 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.07.12 19:33:41 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168) . 2020.07.12 19:33:41 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.07.12 19:33:41 - OpenVPN > open_tun . 2020.07.12 19:33:41 - Elevated: Command:wfp . 2020.07.12 19:33:41 - Above log line repeated 5 times more . 2020.07.12 19:33:41 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{060FEC86-B722-42B0-A96A-B05049513521}.tap . 2020.07.12 19:33:41 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.07.12 19:33:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.16.70.0/10.16.70.60/255.255.255.0 [SUCCEEDED] . 2020.07.12 19:33:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.16.70.60/255.255.255.0 on interface {060FEC86-B722-42B0-A96A-B05049513521} [DHCP-serv: 10.16.70.254, lease-time: 31536000] . 2020.07.12 19:33:41 - OpenVPN > Successful ARP Flush on interface [4] {060FEC86-B722-42B0-A96A-B05049513521} . 2020.07.12 19:33:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=4 fde6:7a:7d20:c46::103a store=active . 2020.07.12 19:33:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection 2 static fde6:7a:7d20:c46::1 validate=no . 2020.07.12 19:33:43 - Shell(14) of 'C:\WINDOWS\system32\route.exe', 2 args: '-6';'PRINT'; . 2020.07.12 19:33:43 - Shell(14) done in 47 ms, exit: 0, out: '=========================================================================== . 2020.07.12 19:33:43 - Interface List . 2020.07.12 19:33:43 - 25...78 2b cb a6 9d cd ......Broadcom NetLink (TM) Gigabit Ethernet . 2020.07.12 19:33:43 - 4...00 ff 06 0f ec 86 ......TAP-Windows Adapter V9 . 2020.07.12 19:33:43 - 23...cc af 78 56 e5 0f ......Broadcom 802.11n Network Adapter . 2020.07.12 19:33:43 - 10...ce af 78 56 e5 0f ......Microsoft Wi-Fi Direct Virtual Adapter #4 . 2020.07.12 19:33:43 - 19...ce af 78 56 ed 0f ......Microsoft Wi-Fi Direct Virtual Adapter #5 . 2020.07.12 19:33:43 - 1...........................Software Loopback Interface 1 . 2020.07.12 19:33:43 - 33...00 15 5d 65 67 e6 ......Hyper-V Virtual Ethernet Adapter . 2020.07.12 19:33:43 - 39...00 15 5d 87 d8 5d ......Hyper-V Virtual Ethernet Adapter #2 . 2020.07.12 19:33:43 - =========================================================================== . 2020.07.12 19:33:43 - IPv6 Route Table . 2020.07.12 19:33:43 - =========================================================================== . 2020.07.12 19:33:43 - Active Routes: . 2020.07.12 19:33:43 - If Metric Network Destination Gateway . 2020.07.12 19:33:43 - 1 331 ::1/128 On-link . 2020.07.12 19:33:43 - 4 281 fde6:7a:7d20:c46::/64 fe80::8 . 2020.07.12 19:33:43 - 4 281 fe80::/64 On-link . 2020.07.12 19:33:43 - 25 281 fe80::/64 On-link . 2020.07.12 19:33:43 - 33 5256 fe80::/64 On-link . 2020.07.12 19:33:43 - 39 5256 fe80::/64 On-link . 2020.07.12 19:33:43 - 25 281 fe80::20e6:50ac:e0c3:df7b/128 . 2020.07.12 19:33:43 - On-link . 2020.07.12 19:33:43 - 33 5256 fe80::6806:141d:aa43:f10c/128 . 2020.07.12 19:33:43 - On-link . 2020.07.12 19:33:43 - 4 281 fe80::ecc9:5b1c:ebaf:21c/128 . 2020.07.12 19:33:43 - On-link . 2020.07.12 19:33:43 - 39 5256 fe80::f443:137f:4133:feae/128 . 2020.07.12 19:33:43 - On-link . 2020.07.12 19:33:43 - 1 331 ff00::/8 On-link . 2020.07.12 19:33:43 - 4 281 ff00::/8 On-link . 2020.07.12 19:33:43 - 25 281 ff00::/8 On-link . 2020.07.12 19:33:43 - 33 5256 ff00::/8 On-link . 2020.07.12 19:33:43 - 39 5256 ff00::/8 On-link . 2020.07.12 19:33:43 - =========================================================================== . 2020.07.12 19:33:43 - Persistent Routes: . 2020.07.12 19:33:43 - None' . 2020.07.12 19:33:43 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c46::/64 -> fde6:7a:7d20:c46::103a metric 0) dev Local Area Connection 2 . 2020.07.12 19:33:43 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c46::/64 interface=4 fe80::8 store=active . 2020.07.12 19:33:43 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:33:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.245 MASK 255.255.255.255 192.168.1.1 . 2020.07.12 19:33:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.07.12 19:33:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.16.70.1 . 2020.07.12 19:33:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.07.12 19:33:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.16.70.1 . 2020.07.12 19:33:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.07.12 19:33:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.07.12 19:33:48 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection 2 . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=4 fe80::8 store=active . 2020.07.12 19:33:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:33:48 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection 2 . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=4 fe80::8 store=active . 2020.07.12 19:33:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:33:48 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection 2 . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=4 fe80::8 store=active . 2020.07.12 19:33:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:33:48 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection 2 . 2020.07.12 19:33:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=4 fe80::8 store=active . 2020.07.12 19:33:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.07.12 19:33:48 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2020.07.12 19:33:48 - Elevated: Command:set-interface-metric . 2020.07.12 19:33:48 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2020.07.12 19:33:48 - Elevated: Command:set-interface-metric . 2020.07.12 19:33:48 - Elevated: Command:wfp . 2020.07.12 19:33:48 - Above log line repeated 5 times more . 2020.07.12 19:33:48 - DNS leak protection with packet filtering enabled. . 2020.07.12 19:33:48 - Shell(15) of 'C:\WINDOWS\system32\route.exe', 2 args: '-4';'PRINT'; . 2020.07.12 19:33:49 - Shell(15) done in 218 ms, exit: 0, out: '=========================================================================== . 2020.07.12 19:33:49 - Interface List . 2020.07.12 19:33:49 - 4...00 ff 06 0f ec 86 ......TAP-Windows Adapter V9 . 2020.07.12 19:33:49 - 25...78 2b cb a6 9d cd ......Broadcom NetLink (TM) Gigabit Ethernet . 2020.07.12 19:33:49 - 23...cc af 78 56 e5 0f ......Broadcom 802.11n Network Adapter . 2020.07.12 19:33:49 - 10...ce af 78 56 e5 0f ......Microsoft Wi-Fi Direct Virtual Adapter #4 . 2020.07.12 19:33:49 - 19...ce af 78 56 ed 0f ......Microsoft Wi-Fi Direct Virtual Adapter #5 . 2020.07.12 19:33:49 - 1...........................Software Loopback Interface 1 . 2020.07.12 19:33:49 - 33...00 15 5d 65 67 e6 ......Hyper-V Virtual Ethernet Adapter . 2020.07.12 19:33:49 - 39...00 15 5d 87 d8 5d ......Hyper-V Virtual Ethernet Adapter #2 . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - IPv4 Route Table . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - Active Routes: . 2020.07.12 19:33:49 - Network Destination Netmask Gateway Interface Metric . 2020.07.12 19:33:49 - 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.250 25 . 2020.07.12 19:33:49 - 0.0.0.0 128.0.0.0 10.16.70.1 10.16.70.60 3 . 2020.07.12 19:33:49 - 10.16.70.0 255.255.255.0 On-link 10.16.70.60 259 . 2020.07.12 19:33:49 - 10.16.70.60 255.255.255.255 On-link 10.16.70.60 259 . 2020.07.12 19:33:49 - 10.16.70.255 255.255.255.255 On-link 10.16.70.60 259 . 2020.07.12 19:33:49 - 104.254.90.245 255.255.255.255 192.168.1.1 192.168.1.250 25 . 2020.07.12 19:33:49 - 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 . 2020.07.12 19:33:49 - 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 . 2020.07.12 19:33:49 - 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 . 2020.07.12 19:33:49 - 128.0.0.0 128.0.0.0 10.16.70.1 10.16.70.60 3 . 2020.07.12 19:33:49 - 172.28.144.0 255.255.240.0 On-link 172.28.144.1 5256 . 2020.07.12 19:33:49 - 172.28.144.1 255.255.255.255 On-link 172.28.144.1 5256 . 2020.07.12 19:33:49 - 172.28.159.255 255.255.255.255 On-link 172.28.144.1 5256 . 2020.07.12 19:33:49 - 172.31.80.0 255.255.240.0 On-link 172.31.80.1 5256 . 2020.07.12 19:33:49 - 172.31.80.1 255.255.255.255 On-link 172.31.80.1 5256 . 2020.07.12 19:33:49 - 172.31.95.255 255.255.255.255 On-link 172.31.80.1 5256 . 2020.07.12 19:33:49 - 192.168.1.0 255.255.255.0 On-link 192.168.1.250 281 . 2020.07.12 19:33:49 - 192.168.1.250 255.255.255.255 On-link 192.168.1.250 281 . 2020.07.12 19:33:49 - 192.168.1.255 255.255.255.255 On-link 192.168.1.250 281 . 2020.07.12 19:33:49 - 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 . 2020.07.12 19:33:49 - 224.0.0.0 240.0.0.0 On-link 10.16.70.60 259 . 2020.07.12 19:33:49 - 224.0.0.0 240.0.0.0 On-link 192.168.1.250 281 . 2020.07.12 19:33:49 - 224.0.0.0 240.0.0.0 On-link 172.31.80.1 5256 . 2020.07.12 19:33:49 - 224.0.0.0 240.0.0.0 On-link 172.28.144.1 5256 . 2020.07.12 19:33:49 - 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 . 2020.07.12 19:33:49 - 255.255.255.255 255.255.255.255 On-link 10.16.70.60 259 . 2020.07.12 19:33:49 - 255.255.255.255 255.255.255.255 On-link 192.168.1.250 281 . 2020.07.12 19:33:49 - 255.255.255.255 255.255.255.255 On-link 172.31.80.1 5256 . 2020.07.12 19:33:49 - 255.255.255.255 255.255.255.255 On-link 172.28.144.1 5256 . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - Persistent Routes: . 2020.07.12 19:33:49 - None' . 2020.07.12 19:33:49 - Shell(16) of 'C:\WINDOWS\system32\route.exe', 2 args: '-6';'PRINT'; . 2020.07.12 19:33:49 - Shell(16) done in 63 ms, exit: 0, out: '=========================================================================== . 2020.07.12 19:33:49 - Interface List . 2020.07.12 19:33:49 - 4...00 ff 06 0f ec 86 ......TAP-Windows Adapter V9 . 2020.07.12 19:33:49 - 25...78 2b cb a6 9d cd ......Broadcom NetLink (TM) Gigabit Ethernet . 2020.07.12 19:33:49 - 23...cc af 78 56 e5 0f ......Broadcom 802.11n Network Adapter . 2020.07.12 19:33:49 - 10...ce af 78 56 e5 0f ......Microsoft Wi-Fi Direct Virtual Adapter #4 . 2020.07.12 19:33:49 - 19...ce af 78 56 ed 0f ......Microsoft Wi-Fi Direct Virtual Adapter #5 . 2020.07.12 19:33:49 - 1...........................Software Loopback Interface 1 . 2020.07.12 19:33:49 - 33...00 15 5d 65 67 e6 ......Hyper-V Virtual Ethernet Adapter . 2020.07.12 19:33:49 - 39...00 15 5d 87 d8 5d ......Hyper-V Virtual Ethernet Adapter #2 . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - IPv6 Route Table . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - Active Routes: . 2020.07.12 19:33:49 - If Metric Network Destination Gateway . 2020.07.12 19:33:49 - 4 259 ::/3 fe80::8 . 2020.07.12 19:33:49 - 1 331 ::1/128 On-link . 2020.07.12 19:33:49 - 4 259 2000::/4 fe80::8 . 2020.07.12 19:33:49 - 4 259 3000::/4 fe80::8 . 2020.07.12 19:33:49 - 4 259 fc00::/7 fe80::8 . 2020.07.12 19:33:49 - 4 259 fde6:7a:7d20:c46::/64 fe80::8 . 2020.07.12 19:33:49 - 4 259 fde6:7a:7d20:c46::103a/128 . 2020.07.12 19:33:49 - On-link . 2020.07.12 19:33:49 - 4 259 fe80::/64 On-link . 2020.07.12 19:33:49 - 25 281 fe80::/64 On-link . 2020.07.12 19:33:49 - 33 5256 fe80::/64 On-link . 2020.07.12 19:33:49 - 39 5256 fe80::/64 On-link . 2020.07.12 19:33:49 - 25 281 fe80::20e6:50ac:e0c3:df7b/128 . 2020.07.12 19:33:49 - On-link . 2020.07.12 19:33:49 - 33 5256 fe80::6806:141d:aa43:f10c/128 . 2020.07.12 19:33:49 - On-link . 2020.07.12 19:33:49 - 4 259 fe80::ecc9:5b1c:ebaf:21c/128 . 2020.07.12 19:33:49 - On-link . 2020.07.12 19:33:49 - 39 5256 fe80::f443:137f:4133:feae/128 . 2020.07.12 19:33:49 - On-link . 2020.07.12 19:33:49 - 1 331 ff00::/8 On-link . 2020.07.12 19:33:49 - 4 259 ff00::/8 On-link . 2020.07.12 19:33:49 - 25 281 ff00::/8 On-link . 2020.07.12 19:33:49 - 33 5256 ff00::/8 On-link . 2020.07.12 19:33:49 - 39 5256 ff00::/8 On-link . 2020.07.12 19:33:49 - =========================================================================== . 2020.07.12 19:33:49 - Persistent Routes: . 2020.07.12 19:33:49 - None' . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 10.16.70.1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv6 of a network adapter forced (Local Area Connection 2, from automatic to fde6:7a:7d20:c46::1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.16.70.1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:c46::1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 10.16.70.1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv6 of a network adapter forced (vEthernet (Ethernet), from automatic to fde6:7a:7d20:c46::1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 10.16.70.1) . 2020.07.12 19:33:49 - Elevated: Command:windows-dns . 2020.07.12 19:33:49 - DNS IPv6 of a network adapter forced (vEthernet (Wi-Fi), from automatic to fde6:7a:7d20:c46::1) . 2020.07.12 19:33:50 - Elevated: Command:route . 2020.07.12 19:33:50 - Routes, added a new route, 104.254.90.243 for gateway 10.16.70.1 . 2020.07.12 19:33:50 - Elevated: Command:route . 2020.07.12 19:33:50 - Routes, added a new route, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c46::1 . 2020.07.12 19:33:50 - Flushing DNS . 2020.07.12 19:33:50 - Elevated: Command:dns-flush . 2020.07.12 19:33:50 - Shell(17) of 'C:\WINDOWS\system32\ipconfig.exe', 1 args: '/flushdns'; . 2020.07.12 19:33:50 - Shell(17) done in 32 ms, exit: 0, out: 'Windows IP Configuration . 2020.07.12 19:33:50 - Successfully flushed the DNS Resolver Cache.' I 2020.07.12 19:33:50 - Checking route IPv4 I 2020.07.12 19:33:50 - Checking route IPv6 I 2020.07.12 19:33:54 - Checking DNS ! 2020.07.12 19:33:54 - Connected. . 2020.07.12 19:33:54 - OpenVPN > Initialization Sequence Completed . 2020.07.12 19:41:52 - Collect information about AirVPN completed . 2020.07.12 20:33:39 - Above log line repeated 1 times more . 2020.07.12 20:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 20:33:39 - OpenVPN > VERIFY KU OK . 2020.07.12 20:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.12 20:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 20:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.12 20:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.12 20:33:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 20:33:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 20:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 20:41:56 - Collect information about AirVPN completed . 2020.07.12 21:33:39 - Above log line repeated 1 times more . 2020.07.12 21:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 21:33:39 - OpenVPN > VERIFY KU OK . 2020.07.12 21:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.12 21:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 21:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.12 21:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.12 21:33:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 21:33:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 21:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 21:42:03 - Collect information about AirVPN completed . 2020.07.12 22:33:39 - Above log line repeated 1 times more . 2020.07.12 22:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 22:33:39 - OpenVPN > VERIFY KU OK . 2020.07.12 22:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.12 22:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 22:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.12 22:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.12 22:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 22:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 22:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 22:42:11 - Collect information about AirVPN completed . 2020.07.12 23:33:39 - Above log line repeated 1 times more . 2020.07.12 23:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.12 23:33:39 - OpenVPN > VERIFY KU OK . 2020.07.12 23:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.12 23:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.12 23:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.12 23:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.12 23:33:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 23:33:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.12 23:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.12 23:42:19 - Collect information about AirVPN completed