gerrit@local:~> cd /usr/local/bin gerrit@local:/usr/local/bin> ./goldcrest AirVPN_Netherlands_UDP-443-Entry3.ovpn 2022-02-09 11:35:48 Reading run control directives from file /home/gerrit/.config/goldcrest.rc Goldcrest 1.2.0 Beta 1 - 7 February 2022 2022-02-09 11:35:48 Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 - 7 February 2022 2022-02-09 11:35:48 OpenVPN core 3.7.1 AirVPN linux x86_64 64-bit 2022-02-09 11:35:48 Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. 2022-02-09 11:35:48 OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:48 Bluetit is ready 2022-02-09 11:35:48 Bluetit options successfully reset 2022-02-09 11:35:48 Requesting VPN connection to Bluetit 2022-02-09 11:35:48 Network filter and lock are using nftables 2022-02-09 11:35:48 Successfully loaded kernel module nf_tables 2022-02-09 11:35:48 WARNING: firewalld is running on this system and may interfere with network filter and lock 2022-02-09 11:35:48 Network filter successfully initialized 2022-02-09 11:35:48 Starting VPN Connection 2022-02-09 11:35:48 TUN persistence is enabled. 2022-02-09 11:35:48 OpenVPN core 3.7.1 AirVPN linux x86_64 64-bit 2022-02-09 11:35:48 Frame=512/2048/512 mssfix-ctrl=1250 2022-02-09 11:35:48 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] 10 [explicit-exit-notify] [5] 2022-02-09 11:35:48 EVENT: RESOLVE 2022-02-09 11:35:48 Local IPv4 address 192.168.178.11 2022-02-09 11:35:48 Local IPv6 address 2001:1c04:581:e700:4865:dde8:fbca:7d68 2022-02-09 11:35:48 Local IPv6 address 2001:1c04:581:e700:aaa1:59ff:fe2f:523e 2022-02-09 11:35:48 Local IPv6 address fe80::aaa1:59ff:fe2f:523e 2022-02-09 11:35:48 Local interface eth0 2022-02-09 11:35:48 Setting up network filter and lock 2022-02-09 11:35:48 Allowing system DNS 84.116.46.20 to pass through the network filter 2022-02-09 11:35:48 Allowing system DNS 84.116.46.21 to pass through the network filter 2022-02-09 11:35:50 Resolved server nl3.vpn.airdns.org into IPv4 213.152.161.17 2022-02-09 11:35:50 Adding IPv4 server 213.152.161.17 to network filter 2022-02-09 11:35:50 Network filter and lock successfully activated 2022-02-09 11:35:50 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:35:50 EVENT: WAIT 2022-02-09 11:35:50 net_route_best_gw query IPv4: 213.152.161.17/32 2022-02-09 11:35:50 sitnl_route_best_gw result: via 192.168.178.1 dev eth0 2022-02-09 11:35:50 net_route_add: 213.152.161.17/32 via 192.168.178.1 dev eth0 table 0 metric 0 2022-02-09 11:35:50 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:35:50 EVENT: CONNECTING 2022-02-09 11:35:50 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:35:50 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:50 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:35:50 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:35:50 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:35:50 Session is ACTIVE 2022-02-09 11:35:50 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:35:50 EVENT: GET_CONFIG 2022-02-09 11:35:50 Sending PUSH_REQUEST to server... 2022-02-09 11:35:50 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [AES-256-CBC] 2022-02-09 11:35:50 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2022-02-09 11:35:50 EVENT: ASSIGN_IP 2022-02-09 11:35:50 VPN Server has pushed IPv4 DNS server 10.30.114.1 2022-02-09 11:35:50 Setting pushed IPv4 DNS server 10.30.114.1 in resolv.conf 2022-02-09 11:35:50 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1a72::1 2022-02-09 11:35:50 Setting pushed IPv6 DNS server fde6:7a:7d20:1a72::1 in resolv.conf 2022-02-09 11:35:50 net_iface_mtu_set: mtu 1500 for tun0 2022-02-09 11:35:50 net_iface_up: set tun0 up 2022-02-09 11:35:50 net_addr_add: 10.30.114.221/24 brd 10.30.114.255 dev tun0 2022-02-09 11:35:50 net_addr_add: fde6:7a:7d20:1a72::10db/64 dev tun0 2022-02-09 11:35:50 net_route_add: 0.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 2022-02-09 11:35:50 net_route_add: 128.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 2022-02-09 11:35:50 net_route_add: ::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 2022-02-09 11:35:50 net_route_add: 8000::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 2022-02-09 11:35:50 TunPersist: saving tun context: Session Name: nl3.vpn.airdns.org Layer: OSI_LAYER_3 Remote Address: 213.152.161.17 Tunnel Addresses: 10.30.114.221/24 -> 10.30.114.1 fde6:7a:7d20:1a72::10db/64 -> fde6:7a:7d20:1a72::1 [IPv6] Reroute Gateway: IPv4=1 IPv6=1 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 IPv6 ] Block IPv4: no Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.30.114.1 fde6:7a:7d20:1a72::1 [IPv6] Search Domains: 2022-02-09 11:35:50 Connected via tun 2022-02-09 11:35:50 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:35:50 Client terminated, restarting in 2000 ms... 2022-02-09 11:35:52 EVENT: RECONNECTING 2022-02-09 11:35:52 ERROR: N_RECONNECT 2022-02-09 11:35:52 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:35:52 EVENT: WAIT 2022-02-09 11:35:52 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:35:52 EVENT: CONNECTING 2022-02-09 11:35:52 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:35:52 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:52 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:35:52 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:35:52 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:35:52 Session is ACTIVE 2022-02-09 11:35:52 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:35:52 EVENT: GET_CONFIG 2022-02-09 11:35:52 Sending PUSH_REQUEST to server... 2022-02-09 11:35:52 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [3] 12 [cipher] [AES-256-CBC] 2022-02-09 11:35:52 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 3 control channel: tls-crypt enabled 2022-02-09 11:35:52 TunPersist: reused tun context 2022-02-09 11:35:52 Connected via tun 2022-02-09 11:35:52 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:35:52 Client terminated, restarting in 2000 ms... 2022-02-09 11:35:54 EVENT: RECONNECTING 2022-02-09 11:35:54 ERROR: N_RECONNECT 2022-02-09 11:35:54 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:35:54 EVENT: WAIT 2022-02-09 11:35:54 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:35:54 EVENT: CONNECTING 2022-02-09 11:35:54 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:35:54 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:54 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:35:54 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:35:54 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:35:54 Session is ACTIVE 2022-02-09 11:35:54 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:35:54 EVENT: GET_CONFIG 2022-02-09 11:35:54 Sending PUSH_REQUEST to server... 2022-02-09 11:35:55 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [AES-256-CBC] 2022-02-09 11:35:55 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2022-02-09 11:35:55 TunPersist: reused tun context 2022-02-09 11:35:55 Connected via tun 2022-02-09 11:35:55 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:35:55 Client terminated, restarting in 2000 ms... 2022-02-09 11:35:57 EVENT: RECONNECTING 2022-02-09 11:35:57 ERROR: N_RECONNECT 2022-02-09 11:35:57 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:35:57 EVENT: WAIT 2022-02-09 11:35:57 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:35:57 EVENT: CONNECTING 2022-02-09 11:35:57 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:35:57 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:57 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:35:57 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:35:57 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:35:57 Session is ACTIVE 2022-02-09 11:35:57 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:35:57 EVENT: GET_CONFIG 2022-02-09 11:35:57 Sending PUSH_REQUEST to server... 2022-02-09 11:35:57 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [3] 12 [cipher] [AES-256-CBC] 2022-02-09 11:35:57 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 3 control channel: tls-crypt enabled 2022-02-09 11:35:57 TunPersist: reused tun context 2022-02-09 11:35:57 Connected via tun 2022-02-09 11:35:57 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:35:57 Client terminated, restarting in 2000 ms... 2022-02-09 11:35:59 EVENT: RECONNECTING 2022-02-09 11:35:59 ERROR: N_RECONNECT 2022-02-09 11:35:59 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:35:59 EVENT: WAIT 2022-02-09 11:35:59 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:35:59 EVENT: CONNECTING 2022-02-09 11:35:59 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:35:59 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:35:59 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:35:59 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:35:59 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:35:59 Session is ACTIVE 2022-02-09 11:35:59 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:35:59 EVENT: GET_CONFIG 2022-02-09 11:35:59 Sending PUSH_REQUEST to server... 2022-02-09 11:35:59 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [AES-256-CBC] 2022-02-09 11:35:59 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2022-02-09 11:35:59 TunPersist: reused tun context 2022-02-09 11:35:59 Connected via tun 2022-02-09 11:35:59 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:35:59 Client terminated, restarting in 2000 ms... 2022-02-09 11:36:01 EVENT: RECONNECTING 2022-02-09 11:36:01 ERROR: N_RECONNECT 2022-02-09 11:36:01 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:36:01 EVENT: WAIT 2022-02-09 11:36:01 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:36:01 EVENT: CONNECTING 2022-02-09 11:36:01 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:36:01 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:36:01 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:36:01 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:36:01 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:36:01 Session is ACTIVE 2022-02-09 11:36:01 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:36:01 EVENT: GET_CONFIG 2022-02-09 11:36:01 Sending PUSH_REQUEST to server... 2022-02-09 11:36:01 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [3] 12 [cipher] [AES-256-CBC] 2022-02-09 11:36:01 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 3 control channel: tls-crypt enabled 2022-02-09 11:36:01 TunPersist: reused tun context 2022-02-09 11:36:01 Connected via tun 2022-02-09 11:36:01 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:36:01 Client terminated, restarting in 2000 ms... 2022-02-09 11:36:03 EVENT: RECONNECTING 2022-02-09 11:36:03 ERROR: N_RECONNECT 2022-02-09 11:36:03 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:36:03 EVENT: WAIT 2022-02-09 11:36:03 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:36:03 EVENT: CONNECTING 2022-02-09 11:36:03 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:36:03 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:36:03 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:36:03 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:36:03 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:36:03 Session is ACTIVE 2022-02-09 11:36:03 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:36:03 EVENT: GET_CONFIG 2022-02-09 11:36:03 Sending PUSH_REQUEST to server... 2022-02-09 11:36:04 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [AES-256-CBC] 2022-02-09 11:36:04 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2022-02-09 11:36:04 TunPersist: reused tun context 2022-02-09 11:36:04 Connected via tun 2022-02-09 11:36:04 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:36:04 Client terminated, restarting in 2000 ms... 2022-02-09 11:36:06 EVENT: RECONNECTING 2022-02-09 11:36:06 ERROR: N_RECONNECT 2022-02-09 11:36:06 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:36:06 EVENT: WAIT 2022-02-09 11:36:06 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:36:06 EVENT: CONNECTING 2022-02-09 11:36:06 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:36:06 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:36:06 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:36:06 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:36:06 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:36:06 Session is ACTIVE 2022-02-09 11:36:06 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:36:06 EVENT: GET_CONFIG 2022-02-09 11:36:06 Sending PUSH_REQUEST to server... 2022-02-09 11:36:06 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [3] 12 [cipher] [AES-256-CBC] 2022-02-09 11:36:06 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 3 control channel: tls-crypt enabled 2022-02-09 11:36:06 TunPersist: reused tun context 2022-02-09 11:36:06 Connected via tun 2022-02-09 11:36:06 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:36:06 Client terminated, restarting in 2000 ms... 2022-02-09 11:36:08 EVENT: RECONNECTING 2022-02-09 11:36:08 ERROR: N_RECONNECT 2022-02-09 11:36:08 Contacting 213.152.161.17:443 via UDP 2022-02-09 11:36:08 EVENT: WAIT 2022-02-09 11:36:08 Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 2022-02-09 11:36:08 EVENT: CONNECTING 2022-02-09 11:36:08 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2022-02-09 11:36:08 Peer Info: IV_VER=3.7.1 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2022-02-09 11:36:08 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2022-02-09 11:36:08 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 2022-02-09 11:36:08 SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2022-02-09 11:36:08 Session is ACTIVE 2022-02-09 11:36:08 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2022-02-09 11:36:08 EVENT: GET_CONFIG 2022-02-09 11:36:08 Sending PUSH_REQUEST to server... 2022-02-09 11:36:08 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.30.114.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1a72::1] 4 [tun-ipv6] 5 [route-gateway] [10.30.114.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1a72::10db/64] [fde6:7a:7d20:1a72::1] 10 [ifconfig] [10.30.114.221] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [AES-256-CBC] 2022-02-09 11:36:08 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2022-02-09 11:36:08 TunPersist: reused tun context 2022-02-09 11:36:08 Connected via tun 2022-02-09 11:36:08 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use 2022-02-09 11:36:08 Client terminated, restarting in 2000 ms... ^C2022-02-09 11:36:08 Caught SIGINT signal. Terminating. 2022-02-09 11:36:08 Bluetit is connected to VPN 2022-02-09 11:36:08 Requesting VPN connection termination to Bluetit 2022-02-09 11:36:09 net_route_del: ::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 2022-02-09 11:36:09 net_route_del: 128.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 2022-02-09 11:36:09 net_route_del: 0.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 2022-02-09 11:36:09 net_addr_del: fde6:7a:7d20:1a72::10db/64 dev tun0 2022-02-09 11:36:09 net_addr_del: 10.30.114.221/24 dev tun0 2022-02-09 11:36:09 net_iface_mtu_set: mtu 1500 for tun0 2022-02-09 11:36:09 net_iface_up: set tun0 down 2022-02-09 11:36:09 net_route_del: 213.152.161.17/32 via 192.168.178.1 dev eth0 table 0 metric 0 2022-02-09 11:36:09 EVENT: DISCONNECTED 2022-02-09 11:36:09 Successfully restored DNS settings 2022-02-09 11:36:09 Network filter successfully restored 2022-02-09 11:36:09 Bluetit session terminated gerrit@local:/usr/local/bin>