I 2021.08.04 07:35:01 - Checking login ... ! 2021.08.04 07:35:03 - Logged in. I 2021.08.04 07:35:06 - Session starting. I 2021.08.04 07:35:08 - Checking authorization ... ! 2021.08.04 07:35:09 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2021.08.04 07:35:09 - Routes, add 64.42.179.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2021.08.04 07:35:09 - Routes, add 64.42.179.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2021.08.04 07:35:10 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.08.04 07:35:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.08.04 07:35:10 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.08.04 07:35:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2021.08.04 07:35:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.08.04 07:35:10 - OpenVPN > UDP link local: (not bound) . 2021.08.04 07:35:10 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2021.08.04 07:35:10 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=0132de30 f70e03b2 . 2021.08.04 07:35:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.08.04 07:35:10 - OpenVPN > VERIFY KU OK . 2021.08.04 07:35:10 - OpenVPN > Validating certificate extended key usage . 2021.08.04 07:35:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.08.04 07:35:10 - OpenVPN > VERIFY EKU OK . 2021.08.04 07:35:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2021.08.04 07:35:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2021.08.04 07:35:10 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2021.08.04 07:35:11 - OpenVPN > SENT CONTROL [Ursa]: 'PUSH_REQUEST' (status=1) . 2021.08.04 07:35:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.130.1,dhcp-option DNS6 fde6:7a:7d20:1382::1,tun-ipv6,route-gateway 10.23.130.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1382::1097/64 fde6:7a:7d20:1382::1,ifconfig 10.23.130.153 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2021.08.04 07:35:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.08.04 07:35:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.130.1' . 2021.08.04 07:35:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1382::1' . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.08.04 07:35:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.08.04 07:35:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.08.04 07:35:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:11 - OpenVPN > interactive service msg_channel=0 . 2021.08.04 07:35:11 - OpenVPN > open_tun . 2021.08.04 07:35:11 - OpenVPN > wintun device [Local Area Connection 2] opened . 2021.08.04 07:35:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 36 static 10.23.130.153 255.255.255.0 . 2021.08.04 07:35:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 36 all . 2021.08.04 07:35:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 36 all . 2021.08.04 07:35:12 - OpenVPN > IPv4 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 36 fde6:7a:7d20:1382::1097/128 store=active . 2021.08.04 07:35:12 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1382::/64 -> fde6:7a:7d20:1382::1097 metric 0) dev Local Area Connection 2 . 2021.08.04 07:35:12 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1382::/64 36 fe80::8 store=active . 2021.08.04 07:35:12 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2021.08.04 07:35:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 36 all . 2021.08.04 07:35:13 - OpenVPN > IPv6 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:13 - OpenVPN > Initialization Sequence Completed W 2021.08.04 07:35:13 - Windows WFP, unexpected: Rule 'dns_block_all' already exists ! 2021.08.04 07:35:13 - Disconnecting . 2021.08.04 07:35:13 - Sending soft termination signal . 2021.08.04 07:35:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.08.04 07:35:18 - OpenVPN > Closing TUN/TAP interface . 2021.08.04 07:35:18 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1382::/64) . 2021.08.04 07:35:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1382::/64 36 fe80::8 store=active . 2021.08.04 07:35:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 36 fde6:7a:7d20:1382::1097 store=active . 2021.08.04 07:35:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 36 10.23.130.153 store=active . 2021.08.04 07:35:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting E 2021.08.04 07:35:19 - Fatal error occured, please contact Eddie support: Routes, remove 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)" failed: Exception: exit:1; out:Element not found. - at Eddie.Core.Platform.Route(Json jRoute, String action) E 2021.08.04 07:35:19 - at Eddie.Core.Session.RoutesApply(String phase) E 2021.08.04 07:35:19 - at Eddie.Core.Session.OnRun() I 2021.08.04 07:35:22 - Checking authorization ... ! 2021.08.04 07:35:24 - Connecting to Pollux (United States of America, Jacksonville, Florida) . 2021.08.04 07:35:24 - Routes, add 198.203.28.45/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2021.08.04 07:35:24 - Routes, add 198.203.28.45/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2021.08.04 07:35:25 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.08.04 07:35:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.08.04 07:35:25 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.08.04 07:35:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.203.28.45:443 . 2021.08.04 07:35:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.08.04 07:35:25 - OpenVPN > UDP link local: (not bound) . 2021.08.04 07:35:25 - OpenVPN > UDP link remote: [AF_INET]198.203.28.45:443 . 2021.08.04 07:35:25 - OpenVPN > TLS: Initial packet from [AF_INET]198.203.28.45:443, sid=8538eb6c 96fc73cd . 2021.08.04 07:35:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.08.04 07:35:25 - OpenVPN > VERIFY KU OK . 2021.08.04 07:35:25 - OpenVPN > Validating certificate extended key usage . 2021.08.04 07:35:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.08.04 07:35:25 - OpenVPN > VERIFY EKU OK . 2021.08.04 07:35:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pollux, emailAddress=info@airvpn.org . 2021.08.04 07:35:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2021.08.04 07:35:25 - OpenVPN > [Pollux] Peer Connection Initiated with [AF_INET]198.203.28.45:443 . 2021.08.04 07:35:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.66.1,dhcp-option DNS6 fde6:7a:7d20:1742::1,tun-ipv6,route-gateway 10.27.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1742::103e/64 fde6:7a:7d20:1742::1,ifconfig 10.27.66.64 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2021.08.04 07:35:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.08.04 07:35:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.66.1' . 2021.08.04 07:35:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1742::1' . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.08.04 07:35:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.08.04 07:35:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.08.04 07:35:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:26 - OpenVPN > interactive service msg_channel=0 . 2021.08.04 07:35:26 - OpenVPN > open_tun . 2021.08.04 07:35:26 - OpenVPN > wintun device [Local Area Connection 2] opened . 2021.08.04 07:35:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 36 static 10.27.66.64 255.255.255.0 . 2021.08.04 07:35:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 36 all . 2021.08.04 07:35:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 36 all . 2021.08.04 07:35:27 - OpenVPN > IPv4 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 36 fde6:7a:7d20:1742::103e/128 store=active . 2021.08.04 07:35:27 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1742::/64 -> fde6:7a:7d20:1742::103e metric 0) dev Local Area Connection 2 . 2021.08.04 07:35:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1742::/64 36 fe80::8 store=active . 2021.08.04 07:35:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2021.08.04 07:35:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 36 all . 2021.08.04 07:35:28 - OpenVPN > IPv6 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:28 - OpenVPN > Initialization Sequence Completed W 2021.08.04 07:35:28 - Windows WFP, unexpected: Rule 'dns_block_all' already exists ! 2021.08.04 07:35:28 - Disconnecting . 2021.08.04 07:35:28 - Sending soft termination signal . 2021.08.04 07:35:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.08.04 07:35:33 - OpenVPN > Closing TUN/TAP interface . 2021.08.04 07:35:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1742::/64) . 2021.08.04 07:35:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1742::/64 36 fe80::8 store=active . 2021.08.04 07:35:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 36 fde6:7a:7d20:1742::103e store=active . 2021.08.04 07:35:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 36 10.27.66.64 store=active . 2021.08.04 07:35:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting E 2021.08.04 07:35:34 - Fatal error occured, please contact Eddie support: Routes, remove 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)" failed: Exception: exit:1; out:Element not found. - at Eddie.Core.Platform.Route(Json jRoute, String action) E 2021.08.04 07:35:34 - at Eddie.Core.Session.RoutesApply(String phase) E 2021.08.04 07:35:34 - at Eddie.Core.Session.OnRun() I 2021.08.04 07:35:37 - Checking authorization ... ! 2021.08.04 07:35:39 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2021.08.04 07:35:39 - Routes, add 64.42.179.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2021.08.04 07:35:39 - Routes, add 64.42.179.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2021.08.04 07:35:40 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.08.04 07:35:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.08.04 07:35:40 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.08.04 07:35:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.08.04 07:35:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.08.04 07:35:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2021.08.04 07:35:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.08.04 07:35:40 - OpenVPN > UDP link local: (not bound) . 2021.08.04 07:35:40 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2021.08.04 07:35:40 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=7569eb35 5a3fc729 . 2021.08.04 07:35:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.08.04 07:35:40 - OpenVPN > VERIFY KU OK . 2021.08.04 07:35:40 - OpenVPN > Validating certificate extended key usage . 2021.08.04 07:35:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.08.04 07:35:40 - OpenVPN > VERIFY EKU OK . 2021.08.04 07:35:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2021.08.04 07:35:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2021.08.04 07:35:40 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2021.08.04 07:35:41 - OpenVPN > SENT CONTROL [Sculptor]: 'PUSH_REQUEST' (status=1) . 2021.08.04 07:35:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.66.1,dhcp-option DNS6 fde6:7a:7d20:1342::1,tun-ipv6,route-gateway 10.23.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1342::1047/64 fde6:7a:7d20:1342::1,ifconfig 10.23.66.73 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2021.08.04 07:35:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.08.04 07:35:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.66.1' . 2021.08.04 07:35:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1342::1' . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.08.04 07:35:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.08.04 07:35:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.08.04 07:35:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.08.04 07:35:41 - OpenVPN > interactive service msg_channel=0 . 2021.08.04 07:35:41 - OpenVPN > open_tun . 2021.08.04 07:35:41 - OpenVPN > wintun device [Local Area Connection 2] opened . 2021.08.04 07:35:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 36 static 10.23.66.73 255.255.255.0 . 2021.08.04 07:35:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 36 all . 2021.08.04 07:35:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 36 all . 2021.08.04 07:35:42 - OpenVPN > IPv4 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 36 fde6:7a:7d20:1342::1047/128 store=active . 2021.08.04 07:35:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1342::/64 -> fde6:7a:7d20:1342::1047 metric 0) dev Local Area Connection 2 . 2021.08.04 07:35:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1342::/64 36 fe80::8 store=active . 2021.08.04 07:35:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2021.08.04 07:35:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 36 all . 2021.08.04 07:35:43 - OpenVPN > IPv6 MTU set to 1500 on interface 36 using SetIpInterfaceEntry() . 2021.08.04 07:35:43 - OpenVPN > Initialization Sequence Completed W 2021.08.04 07:35:43 - Windows WFP, unexpected: Rule 'dns_block_all' already exists ! 2021.08.04 07:35:43 - Disconnecting . 2021.08.04 07:35:43 - Sending soft termination signal . 2021.08.04 07:35:46 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.08.04 07:35:48 - OpenVPN > Closing TUN/TAP interface . 2021.08.04 07:35:48 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1342::/64) . 2021.08.04 07:35:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1342::/64 36 fe80::8 store=active . 2021.08.04 07:35:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 36 fde6:7a:7d20:1342::1047 store=active . 2021.08.04 07:35:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 36 10.23.66.73 store=active . 2021.08.04 07:35:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting E 2021.08.04 07:35:49 - Fatal error occured, please contact Eddie support: Routes, remove 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)" failed: Exception: exit:1; out:Element not found. - at Eddie.Core.Platform.Route(Json jRoute, String action) E 2021.08.04 07:35:49 - at Eddie.Core.Session.RoutesApply(String phase) E 2021.08.04 07:35:49 - at Eddie.Core.Session.OnRun() I 2021.08.04 07:35:51 - Cancel requested. ! 2021.08.04 07:35:51 - Session terminated.