Eddie System/Environment Report - 2/11/2022 - 3:09 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19043.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\raeo\AppData\Local\Eddie\default.profile Data path: C:\Users\raeo\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: Yes, Alkes Detected DNS: fde6:7a:7d20:2b2::1, 10.6.178.1, fe80::b69e:80ff:fe4e:cbe5, 192.168.2.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 355 ms Test Ping IPv6: 350 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True mode.protocol: UDP mode.alt: 2 ui.unit: bytes ---------------------------- Logs: . 2022.02.11 02:35:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 02:35:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 02:35:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.53:443 . 2022.02.11 02:35:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 02:35:39 - OpenVPN > UDP link local: (not bound) . 2022.02.11 02:35:39 - OpenVPN > UDP link remote: [AF_INET]107.167.244.53:443 . 2022.02.11 02:35:39 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.53:443, sid=67a6930d 9d8492db . 2022.02.11 02:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 02:35:39 - OpenVPN > VERIFY KU OK . 2022.02.11 02:35:39 - OpenVPN > Validating certificate extended key usage . 2022.02.11 02:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 02:35:39 - OpenVPN > VERIFY EKU OK . 2022.02.11 02:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 02:35:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 02:35:39 - OpenVPN > [Merope] Peer Connection Initiated with [AF_INET]107.167.244.53:443 . 2022.02.11 02:35:40 - OpenVPN > SENT CONTROL [Merope]: 'PUSH_REQUEST' (status=1) . 2022.02.11 02:35:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.94.1,dhcp-option DNS6 fde6:7a:7d20:125e::1,tun-ipv6,route-gateway 10.22.94.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:125e::102c/64 fde6:7a:7d20:125e::1,ifconfig 10.22.94.46 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.02.11 02:35:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 02:35:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 02:35:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 02:35:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 02:35:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 02:35:40 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 02:35:40 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 02:35:40 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 02:35:40 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 02:35:40 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 02:35:40 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 02:35:40 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 02:35:40 - OpenVPN > open_tun . 2022.02.11 02:35:40 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 02:35:40 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 02:35:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.94.0/10.22.94.46/255.255.255.0 [SUCCEEDED] . 2022.02.11 02:35:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.94.46/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.22.94.254, lease-time: 31536000] . 2022.02.11 02:35:40 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 02:35:40 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 02:35:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:125e::102c/128 store=active . 2022.02.11 02:35:40 - OpenVPN > add_route_ipv6(fde6:7a:7d20:125e::/64 -> fde6:7a:7d20:125e::102c metric 0) dev Local Area Connection . 2022.02.11 02:35:40 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:125e::/64 13 fe80::8 store=active . 2022.02.11 02:35:40 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 02:35:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 02:35:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:125e::1 validate=no . 2022.02.11 02:35:41 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 02:35:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 02:35:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2022.02.11 02:35:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.94.1 . 2022.02.11 02:35:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 02:35:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.94.1 . 2022.02.11 02:35:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 02:35:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 02:35:45 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:125e::1 metric -1) dev Local Area Connection . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 02:35:45 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 02:35:45 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:125e::1 metric -1) dev Local Area Connection . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 02:35:45 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 02:35:45 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:125e::1 metric -1) dev Local Area Connection . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 02:35:45 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 02:35:45 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:125e::1 metric -1) dev Local Area Connection . 2022.02.11 02:35:45 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 02:35:45 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 02:35:45 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 02:35:45 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 02:35:45 - DNS leak protection with packet filtering enabled. . 2022.02.11 02:35:45 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.22.94.1) . 2022.02.11 02:35:45 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:125e::1) . 2022.02.11 02:35:46 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.22.94.1) . 2022.02.11 02:35:46 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:125e::1) . 2022.02.11 02:35:46 - Routes, added a new route, 107.167.244.51 for gateway 10.22.94.1 . 2022.02.11 02:35:46 - Routes, added a new route, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:125e::1 . 2022.02.11 02:35:46 - Flushing DNS I 2022.02.11 02:35:46 - Checking route IPv4 I 2022.02.11 02:35:47 - Checking route IPv6 I 2022.02.11 02:35:52 - Checking DNS ! 2022.02.11 02:35:53 - Connected. . 2022.02.11 02:35:54 - OpenVPN > Initialization Sequence Completed . 2022.02.11 03:04:41 - Collect information about AirVPN completed . 2022.02.11 03:30:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 03:30:08 - OpenVPN > VERIFY KU OK . 2022.02.11 03:30:08 - OpenVPN > Validating certificate extended key usage . 2022.02.11 03:30:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 03:30:08 - OpenVPN > VERIFY EKU OK . 2022.02.11 03:30:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 03:30:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 03:30:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 03:30:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 03:34:50 - Collect information about AirVPN completed . 2022.02.11 04:24:38 - Above log line repeated 1 times more . 2022.02.11 04:24:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 04:24:38 - OpenVPN > VERIFY KU OK . 2022.02.11 04:24:38 - OpenVPN > Validating certificate extended key usage . 2022.02.11 04:24:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 04:24:38 - OpenVPN > VERIFY EKU OK . 2022.02.11 04:24:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 04:24:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 04:24:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 04:24:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 04:34:50 - Collect information about AirVPN completed . 2022.02.11 05:19:07 - Above log line repeated 1 times more . 2022.02.11 05:19:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 05:19:07 - OpenVPN > VERIFY KU OK . 2022.02.11 05:19:07 - OpenVPN > Validating certificate extended key usage . 2022.02.11 05:19:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 05:19:07 - OpenVPN > VERIFY EKU OK . 2022.02.11 05:19:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 05:19:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 05:19:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 05:19:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 05:34:51 - Collect information about AirVPN completed . 2022.02.11 06:13:36 - Above log line repeated 1 times more . 2022.02.11 06:13:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 06:13:36 - OpenVPN > VERIFY KU OK . 2022.02.11 06:13:36 - OpenVPN > Validating certificate extended key usage . 2022.02.11 06:13:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 06:13:36 - OpenVPN > VERIFY EKU OK . 2022.02.11 06:13:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 06:13:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 06:13:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 06:13:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 06:35:03 - Collect information about AirVPN completed . 2022.02.11 07:08:05 - Above log line repeated 1 times more . 2022.02.11 07:08:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 07:08:05 - OpenVPN > VERIFY KU OK . 2022.02.11 07:08:05 - OpenVPN > Validating certificate extended key usage . 2022.02.11 07:08:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 07:08:05 - OpenVPN > VERIFY EKU OK . 2022.02.11 07:08:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 07:08:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 07:08:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 07:08:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 07:35:12 - Collect information about AirVPN completed . 2022.02.11 08:02:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 08:02:34 - OpenVPN > VERIFY KU OK . 2022.02.11 08:02:34 - OpenVPN > Validating certificate extended key usage . 2022.02.11 08:02:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 08:02:34 - OpenVPN > VERIFY EKU OK . 2022.02.11 08:02:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 08:02:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 08:02:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 08:02:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 08:05:18 - Collect information about AirVPN completed . 2022.02.11 08:57:03 - Above log line repeated 1 times more . 2022.02.11 08:57:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 08:57:03 - OpenVPN > VERIFY KU OK . 2022.02.11 08:57:03 - OpenVPN > Validating certificate extended key usage . 2022.02.11 08:57:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 08:57:03 - OpenVPN > VERIFY EKU OK . 2022.02.11 08:57:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 08:57:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 08:57:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 08:57:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 09:05:28 - Collect information about AirVPN completed . 2022.02.11 09:51:32 - Above log line repeated 1 times more . 2022.02.11 09:51:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 09:51:32 - OpenVPN > VERIFY KU OK . 2022.02.11 09:51:32 - OpenVPN > Validating certificate extended key usage . 2022.02.11 09:51:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 09:51:32 - OpenVPN > VERIFY EKU OK . 2022.02.11 09:51:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 09:51:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 09:51:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 09:51:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 10:05:39 - Collect information about AirVPN completed . 2022.02.11 10:46:01 - Above log line repeated 1 times more . 2022.02.11 10:46:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 10:46:01 - OpenVPN > VERIFY KU OK . 2022.02.11 10:46:01 - OpenVPN > Validating certificate extended key usage . 2022.02.11 10:46:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 10:46:01 - OpenVPN > VERIFY EKU OK . 2022.02.11 10:46:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 10:46:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 10:46:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 10:46:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 11:05:49 - Collect information about AirVPN completed . 2022.02.11 11:40:30 - Above log line repeated 1 times more . 2022.02.11 11:40:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 11:40:30 - OpenVPN > VERIFY KU OK . 2022.02.11 11:40:30 - OpenVPN > Validating certificate extended key usage . 2022.02.11 11:40:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 11:40:30 - OpenVPN > VERIFY EKU OK . 2022.02.11 11:40:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 11:40:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 11:40:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 11:40:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 12:05:58 - Collect information about AirVPN completed . 2022.02.11 12:34:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 12:34:59 - OpenVPN > VERIFY KU OK . 2022.02.11 12:34:59 - OpenVPN > Validating certificate extended key usage . 2022.02.11 12:34:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 12:34:59 - OpenVPN > VERIFY EKU OK . 2022.02.11 12:34:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 12:35:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 12:35:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 12:35:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 12:36:04 - Collect information about AirVPN completed . 2022.02.11 13:29:29 - Above log line repeated 1 times more . 2022.02.11 13:29:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 13:29:29 - OpenVPN > VERIFY KU OK . 2022.02.11 13:29:29 - OpenVPN > Validating certificate extended key usage . 2022.02.11 13:29:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 13:29:29 - OpenVPN > VERIFY EKU OK . 2022.02.11 13:29:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 13:29:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 13:29:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 13:29:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 13:36:09 - Collect information about AirVPN completed . 2022.02.11 14:23:58 - Above log line repeated 1 times more . 2022.02.11 14:23:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 14:23:58 - OpenVPN > VERIFY KU OK . 2022.02.11 14:23:58 - OpenVPN > Validating certificate extended key usage . 2022.02.11 14:23:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 14:23:58 - OpenVPN > VERIFY EKU OK . 2022.02.11 14:23:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 14:23:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 14:23:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 14:23:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 14:36:15 - Collect information about AirVPN completed . 2022.02.11 15:18:27 - Above log line repeated 1 times more . 2022.02.11 15:18:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 15:18:27 - OpenVPN > VERIFY KU OK . 2022.02.11 15:18:27 - OpenVPN > Validating certificate extended key usage . 2022.02.11 15:18:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 15:18:27 - OpenVPN > VERIFY EKU OK . 2022.02.11 15:18:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 15:18:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 15:18:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 15:18:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 15:36:19 - Collect information about AirVPN completed . 2022.02.11 16:12:56 - Above log line repeated 1 times more . 2022.02.11 16:12:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 16:12:56 - OpenVPN > VERIFY KU OK . 2022.02.11 16:12:56 - OpenVPN > Validating certificate extended key usage . 2022.02.11 16:12:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 16:12:56 - OpenVPN > VERIFY EKU OK . 2022.02.11 16:12:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 16:12:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 16:12:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 16:12:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 16:36:26 - Collect information about AirVPN completed . 2022.02.11 17:07:25 - Above log line repeated 1 times more . 2022.02.11 17:07:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 17:07:25 - OpenVPN > VERIFY KU OK . 2022.02.11 17:07:25 - OpenVPN > Validating certificate extended key usage . 2022.02.11 17:07:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 17:07:25 - OpenVPN > VERIFY EKU OK . 2022.02.11 17:07:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 17:07:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 17:07:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 17:07:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 17:36:37 - Collect information about AirVPN completed . 2022.02.11 18:01:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 18:01:54 - OpenVPN > VERIFY KU OK . 2022.02.11 18:01:54 - OpenVPN > Validating certificate extended key usage . 2022.02.11 18:01:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 18:01:54 - OpenVPN > VERIFY EKU OK . 2022.02.11 18:01:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 18:01:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 18:01:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 18:01:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 18:06:43 - Collect information about AirVPN completed . 2022.02.11 18:41:20 - Above log line repeated 1 times more . 2022.02.11 18:41:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8615162 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.11 18:41:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8615163 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.11 18:44:05 - Above log line repeated 10 times more ! 2022.02.11 18:44:05 - Disconnecting . 2022.02.11 18:44:06 - Routes, removed a route previously added, 107.167.244.51 for gateway 10.22.94.1 . 2022.02.11 18:44:06 - Routes, removed a route previously added, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:125e::1 . 2022.02.11 18:44:06 - Sending soft termination signal . 2022.02.11 18:44:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.11 18:44:11 - OpenVPN > C:\windows\system32\route.exe DELETE 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 18:44:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:44:11 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.94.1 . 2022.02.11 18:44:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:44:11 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.94.1 . 2022.02.11 18:44:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:44:11 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.11 18:44:11 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 13 fe80::8 store=active . 2022.02.11 18:44:11 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:11 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.11 18:44:11 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 13 fe80::8 store=active . 2022.02.11 18:44:11 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:12 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.11 18:44:12 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 13 fe80::8 store=active . 2022.02.11 18:44:12 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:12 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.11 18:44:12 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 13 fe80::8 store=active . 2022.02.11 18:44:12 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:12 - OpenVPN > Closing TUN/TAP interface . 2022.02.11 18:44:12 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 18:44:12 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:125e::/64) . 2022.02.11 18:44:12 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:125e::/64 13 fe80::8 store=active . 2022.02.11 18:44:12 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 13 fde6:7a:7d20:125e::102c store=active . 2022.02.11 18:44:12 - OpenVPN > TAP: DHCP address released . 2022.02.11 18:44:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.11 18:44:12 - Connection terminated. . 2022.02.11 18:44:12 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 18:44:12 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 18:44:12 - DNS IPv4 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 18:44:12 - DNS IPv6 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 18:44:12 - DNS leak protection with packet filtering disabled. . 2022.02.11 18:44:12 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.11 18:44:12 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.11 18:44:12 - Flushing DNS ! 2022.02.11 18:44:13 - Session terminated. I 2022.02.11 18:44:17 - Session starting. I 2022.02.11 18:44:17 - Checking authorization ... ! 2022.02.11 18:44:19 - Connecting to Alkes (United States of America, Los Angeles) . 2022.02.11 18:44:19 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.11 18:44:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.11 18:44:19 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.11 18:44:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 18:44:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 18:44:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 18:44:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 18:44:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.69:443 . 2022.02.11 18:44:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 18:44:19 - OpenVPN > UDP link local: (not bound) . 2022.02.11 18:44:19 - OpenVPN > UDP link remote: [AF_INET]107.167.244.69:443 . 2022.02.11 18:44:19 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.69:443, sid=d13b14bf c32a9a23 . 2022.02.11 18:44:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 18:44:19 - OpenVPN > VERIFY KU OK . 2022.02.11 18:44:19 - OpenVPN > Validating certificate extended key usage . 2022.02.11 18:44:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 18:44:19 - OpenVPN > VERIFY EKU OK . 2022.02.11 18:44:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkes, emailAddress=info@airvpn.org . 2022.02.11 18:44:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 18:44:20 - OpenVPN > [Alkes] Peer Connection Initiated with [AF_INET]107.167.244.69:443 . 2022.02.11 18:44:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.190.1,dhcp-option DNS6 fde6:7a:7d20:2be::1,tun-ipv6,route-gateway 10.6.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2be::103f/64 fde6:7a:7d20:2be::1,ifconfig 10.6.190.65 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2022.02.11 18:44:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 18:44:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 18:44:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 18:44:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 18:44:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 18:44:20 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 18:44:20 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 18:44:20 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 18:44:20 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 18:44:20 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 18:44:20 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 18:44:20 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 18:44:20 - OpenVPN > open_tun . 2022.02.11 18:44:20 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 18:44:20 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 18:44:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.190.0/10.6.190.65/255.255.255.0 [SUCCEEDED] . 2022.02.11 18:44:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.190.65/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.6.190.254, lease-time: 31536000] . 2022.02.11 18:44:20 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 18:44:20 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 18:44:20 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:2be::103f/128 store=active . 2022.02.11 18:44:21 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2be::/64 -> fde6:7a:7d20:2be::103f metric 0) dev Local Area Connection . 2022.02.11 18:44:21 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2be::/64 13 fe80::8 store=active . 2022.02.11 18:44:21 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 18:44:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:2be::1 validate=no . 2022.02.11 18:44:21 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 18:44:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.69 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 18:44:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2022.02.11 18:44:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.190.1 . 2022.02.11 18:44:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 18:44:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.190.1 . 2022.02.11 18:44:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 18:44:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 18:44:27 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:2be::1 metric -1) dev Local Area Connection . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 18:44:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:27 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:2be::1 metric -1) dev Local Area Connection . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 18:44:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:27 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:2be::1 metric -1) dev Local Area Connection . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 18:44:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:27 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:2be::1 metric -1) dev Local Area Connection . 2022.02.11 18:44:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 18:44:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:44:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 18:44:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 18:44:27 - DNS leak protection with packet filtering enabled. . 2022.02.11 18:44:27 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.6.190.1) . 2022.02.11 18:44:27 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:2be::1) . 2022.02.11 18:44:27 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.6.190.1) . 2022.02.11 18:44:27 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:2be::1) . 2022.02.11 18:44:28 - Routes, added a new route, 107.167.244.67 for gateway 10.6.190.1 . 2022.02.11 18:44:28 - Routes, added a new route, 2605:8681:0:3:17a6:a320:1d5f:e175 for gateway fde6:7a:7d20:2be::1 . 2022.02.11 18:44:28 - Flushing DNS I 2022.02.11 18:44:28 - Checking route IPv4 I 2022.02.11 18:44:29 - Checking route IPv6 I 2022.02.11 18:44:34 - Checking DNS ! 2022.02.11 18:44:35 - Connected. . 2022.02.11 18:44:35 - OpenVPN > Initialization Sequence Completed ! 2022.02.11 18:59:22 - Disconnecting . 2022.02.11 18:59:22 - Routes, removed a route previously added, 107.167.244.67 for gateway 10.6.190.1 . 2022.02.11 18:59:22 - Routes, removed a route previously added, 2605:8681:0:3:17a6:a320:1d5f:e175 for gateway fde6:7a:7d20:2be::1 . 2022.02.11 18:59:22 - Sending soft termination signal . 2022.02.11 18:59:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\route.exe DELETE 107.167.244.69 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 18:59:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.190.1 . 2022.02.11 18:59:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.190.1 . 2022.02.11 18:59:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 18:59:27 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 13 fe80::8 store=active . 2022.02.11 18:59:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:59:27 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 13 fe80::8 store=active . 2022.02.11 18:59:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:59:27 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 13 fe80::8 store=active . 2022.02.11 18:59:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:59:27 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 13 fe80::8 store=active . 2022.02.11 18:59:27 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 18:59:27 - OpenVPN > Closing TUN/TAP interface . 2022.02.11 18:59:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 18:59:27 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2be::/64) . 2022.02.11 18:59:27 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2be::/64 13 fe80::8 store=active . 2022.02.11 18:59:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 13 fde6:7a:7d20:2be::103f store=active . 2022.02.11 18:59:27 - OpenVPN > TAP: DHCP address released . 2022.02.11 18:59:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.11 18:59:27 - Connection terminated. . 2022.02.11 18:59:27 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 18:59:27 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 18:59:27 - DNS IPv4 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 18:59:27 - DNS IPv6 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 18:59:27 - DNS leak protection with packet filtering disabled. . 2022.02.11 18:59:27 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.11 18:59:27 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.11 18:59:27 - Flushing DNS ! 2022.02.11 18:59:28 - Session terminated. . 2022.02.11 18:59:31 - Collect information about AirVPN completed I 2022.02.11 19:00:09 - Session starting. I 2022.02.11 19:00:10 - Checking authorization ... ! 2022.02.11 19:00:11 - Connecting to Sabik (United States of America, Los Angeles) . 2022.02.11 19:00:11 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.11 19:00:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.11 19:00:11 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.11 19:00:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 19:00:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 19:00:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 19:00:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 19:00:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.85:443 . 2022.02.11 19:00:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 19:00:11 - OpenVPN > UDP link local: (not bound) . 2022.02.11 19:00:11 - OpenVPN > UDP link remote: [AF_INET]107.167.244.85:443 . 2022.02.11 19:00:12 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.85:443, sid=e222b5ec 4fcc0d50 . 2022.02.11 19:00:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 19:00:12 - OpenVPN > VERIFY KU OK . 2022.02.11 19:00:12 - OpenVPN > Validating certificate extended key usage . 2022.02.11 19:00:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 19:00:12 - OpenVPN > VERIFY EKU OK . 2022.02.11 19:00:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sabik, emailAddress=info@airvpn.org . 2022.02.11 19:00:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 19:00:12 - OpenVPN > [Sabik] Peer Connection Initiated with [AF_INET]107.167.244.85:443 . 2022.02.11 19:00:13 - OpenVPN > SENT CONTROL [Sabik]: 'PUSH_REQUEST' (status=1) . 2022.02.11 19:00:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.158.1,dhcp-option DNS6 fde6:7a:7d20:189e::1,tun-ipv6,route-gateway 10.28.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:189e::106e/64 fde6:7a:7d20:189e::1,ifconfig 10.28.158.112 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.02.11 19:00:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 19:00:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 19:00:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 19:00:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 19:00:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 19:00:13 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 19:00:13 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 19:00:13 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 19:00:13 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 19:00:13 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 19:00:13 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 19:00:13 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 19:00:13 - OpenVPN > open_tun . 2022.02.11 19:00:13 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 19:00:13 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 19:00:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.28.158.0/10.28.158.112/255.255.255.0 [SUCCEEDED] . 2022.02.11 19:00:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.28.158.112/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.28.158.254, lease-time: 31536000] . 2022.02.11 19:00:13 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 19:00:13 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 19:00:13 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:189e::106e/128 store=active . 2022.02.11 19:00:13 - OpenVPN > add_route_ipv6(fde6:7a:7d20:189e::/64 -> fde6:7a:7d20:189e::106e metric 0) dev Local Area Connection . 2022.02.11 19:00:13 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:189e::/64 13 fe80::8 store=active . 2022.02.11 19:00:13 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:00:13 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 19:00:13 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:189e::1 validate=no . 2022.02.11 19:00:13 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 19:00:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.85 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 19:00:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2022.02.11 19:00:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.28.158.1 . 2022.02.11 19:00:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 19:00:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.28.158.1 . 2022.02.11 19:00:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 19:00:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:00:18 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:189e::1 metric -1) dev Local Area Connection . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 19:00:18 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:00:18 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:189e::1 metric -1) dev Local Area Connection . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 19:00:18 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:00:18 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:189e::1 metric -1) dev Local Area Connection . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 19:00:18 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:00:18 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:189e::1 metric -1) dev Local Area Connection . 2022.02.11 19:00:18 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 19:00:18 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:00:18 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 19:00:18 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 19:00:18 - DNS leak protection with packet filtering enabled. . 2022.02.11 19:00:19 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.28.158.1) . 2022.02.11 19:00:19 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:189e::1) . 2022.02.11 19:00:19 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.28.158.1) . 2022.02.11 19:00:19 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:189e::1) . 2022.02.11 19:00:19 - Routes, added a new route, 107.167.244.83 for gateway 10.28.158.1 . 2022.02.11 19:00:19 - Routes, added a new route, 2605:8681:0:4:4e67:7cc3:c91e:244f for gateway fde6:7a:7d20:189e::1 . 2022.02.11 19:00:19 - Flushing DNS I 2022.02.11 19:00:19 - Checking route IPv4 I 2022.02.11 19:00:20 - Checking route IPv6 I 2022.02.11 19:00:27 - Checking DNS ! 2022.02.11 19:00:29 - Connected. . 2022.02.11 19:00:29 - OpenVPN > Initialization Sequence Completed ! 2022.02.11 19:04:30 - Disconnecting . 2022.02.11 19:04:30 - Routes, removed a route previously added, 107.167.244.83 for gateway 10.28.158.1 . 2022.02.11 19:04:30 - Routes, removed a route previously added, 2605:8681:0:4:4e67:7cc3:c91e:244f for gateway fde6:7a:7d20:189e::1 . 2022.02.11 19:04:30 - Sending soft termination signal . 2022.02.11 19:04:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\route.exe DELETE 107.167.244.85 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 19:04:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.28.158.1 . 2022.02.11 19:04:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.28.158.1 . 2022.02.11 19:04:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 19:04:35 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 13 fe80::8 store=active . 2022.02.11 19:04:35 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:04:35 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 13 fe80::8 store=active . 2022.02.11 19:04:35 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:04:35 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 13 fe80::8 store=active . 2022.02.11 19:04:35 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:04:35 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 13 fe80::8 store=active . 2022.02.11 19:04:35 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:04:35 - OpenVPN > Closing TUN/TAP interface . 2022.02.11 19:04:35 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 19:04:35 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:189e::/64) . 2022.02.11 19:04:35 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:189e::/64 13 fe80::8 store=active . 2022.02.11 19:04:35 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 13 fde6:7a:7d20:189e::106e store=active . 2022.02.11 19:04:35 - OpenVPN > TAP: DHCP address released . 2022.02.11 19:04:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.11 19:04:35 - Connection terminated. . 2022.02.11 19:04:35 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 19:04:35 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 19:04:36 - DNS IPv4 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 19:04:36 - DNS IPv6 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 19:04:36 - DNS leak protection with packet filtering disabled. . 2022.02.11 19:04:36 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.11 19:04:36 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.11 19:04:36 - Flushing DNS ! 2022.02.11 19:04:36 - Session terminated. . 2022.02.11 19:06:25 - Collect information about AirVPN completed I 2022.02.11 19:06:57 - Session starting. I 2022.02.11 19:06:58 - Checking authorization ... ! 2022.02.11 19:06:58 - Connecting to Merope (United States of America, Los Angeles) . 2022.02.11 19:06:59 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.11 19:06:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.11 19:06:59 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.11 19:06:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 19:06:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 19:06:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 19:06:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 19:06:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.53:443 . 2022.02.11 19:06:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 19:06:59 - OpenVPN > UDP link local: (not bound) . 2022.02.11 19:06:59 - OpenVPN > UDP link remote: [AF_INET]107.167.244.53:443 . 2022.02.11 19:06:59 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.53:443, sid=f30a846c 97cdcc4e . 2022.02.11 19:06:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 19:06:59 - OpenVPN > VERIFY KU OK . 2022.02.11 19:06:59 - OpenVPN > Validating certificate extended key usage . 2022.02.11 19:06:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 19:06:59 - OpenVPN > VERIFY EKU OK . 2022.02.11 19:06:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 19:06:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 19:06:59 - OpenVPN > [Merope] Peer Connection Initiated with [AF_INET]107.167.244.53:443 . 2022.02.11 19:07:00 - OpenVPN > SENT CONTROL [Merope]: 'PUSH_REQUEST' (status=1) . 2022.02.11 19:07:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.82.1,dhcp-option DNS6 fde6:7a:7d20:1252::1,tun-ipv6,route-gateway 10.22.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1252::106f/64 fde6:7a:7d20:1252::1,ifconfig 10.22.82.113 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.02.11 19:07:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 19:07:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 19:07:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 19:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 19:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 19:07:00 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 19:07:00 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 19:07:00 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 19:07:00 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 19:07:00 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 19:07:00 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 19:07:00 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 19:07:00 - OpenVPN > open_tun . 2022.02.11 19:07:01 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 19:07:01 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 19:07:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.82.0/10.22.82.113/255.255.255.0 [SUCCEEDED] . 2022.02.11 19:07:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.82.113/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.22.82.254, lease-time: 31536000] . 2022.02.11 19:07:01 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 19:07:01 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 19:07:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:1252::106f/128 store=active . 2022.02.11 19:07:01 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1252::/64 -> fde6:7a:7d20:1252::106f metric 0) dev Local Area Connection . 2022.02.11 19:07:01 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1252::/64 13 fe80::8 store=active . 2022.02.11 19:07:01 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:07:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 19:07:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:1252::1 validate=no . 2022.02.11 19:07:01 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 19:07:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2022.02.11 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 19:07:06 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 19:07:06 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:07:06 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 19:07:06 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:07:06 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 19:07:06 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:07:06 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 19:07:06 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 19:07:06 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 19:07:07 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 19:07:07 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 19:07:07 - DNS leak protection with packet filtering enabled. . 2022.02.11 19:07:07 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.22.82.1) . 2022.02.11 19:07:07 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:1252::1) . 2022.02.11 19:07:07 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.22.82.1) . 2022.02.11 19:07:07 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:1252::1) . 2022.02.11 19:07:07 - Routes, added a new route, 107.167.244.51 for gateway 10.22.82.1 . 2022.02.11 19:07:08 - Routes, added a new route, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:1252::1 . 2022.02.11 19:07:08 - Flushing DNS I 2022.02.11 19:07:08 - Checking route IPv4 I 2022.02.11 19:07:09 - Checking route IPv6 I 2022.02.11 19:07:14 - Checking DNS ! 2022.02.11 19:07:15 - Connected. . 2022.02.11 19:07:15 - OpenVPN > Initialization Sequence Completed . 2022.02.11 19:36:29 - Collect information about AirVPN completed . 2022.02.11 20:04:39 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6136213 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.11 20:06:10 - Above log line repeated 709 times more . 2022.02.11 20:06:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 20:06:10 - OpenVPN > VERIFY KU OK . 2022.02.11 20:06:10 - OpenVPN > Validating certificate extended key usage . 2022.02.11 20:06:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 20:06:10 - OpenVPN > VERIFY EKU OK . 2022.02.11 20:06:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 20:06:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 20:06:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 20:06:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 20:06:31 - Collect information about AirVPN completed . 2022.02.11 21:05:19 - Above log line repeated 1 times more . 2022.02.11 21:05:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 21:05:19 - OpenVPN > VERIFY KU OK . 2022.02.11 21:05:19 - OpenVPN > Validating certificate extended key usage . 2022.02.11 21:05:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 21:05:19 - OpenVPN > VERIFY EKU OK . 2022.02.11 21:05:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 21:05:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 21:05:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 21:05:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 21:06:38 - Collect information about AirVPN completed . 2022.02.11 21:22:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #96168 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.11 21:36:41 - Above log line repeated 204 times more . 2022.02.11 21:36:41 - Collect information about AirVPN completed . 2022.02.11 21:42:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2024820 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.11 22:04:30 - Above log line repeated 46 times more . 2022.02.11 22:04:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 22:04:30 - OpenVPN > VERIFY KU OK . 2022.02.11 22:04:30 - OpenVPN > Validating certificate extended key usage . 2022.02.11 22:04:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 22:04:30 - OpenVPN > VERIFY EKU OK . 2022.02.11 22:04:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 22:04:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 22:04:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 22:04:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 22:06:47 - Collect information about AirVPN completed ! 2022.02.11 22:15:28 - Disconnecting . 2022.02.11 22:15:28 - Routes, removed a route previously added, 107.167.244.51 for gateway 10.22.82.1 . 2022.02.11 22:15:28 - Routes, removed a route previously added, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:1252::1 . 2022.02.11 22:15:28 - Sending soft termination signal . 2022.02.11 22:15:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\route.exe DELETE 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 22:15:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 22:15:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 22:15:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 22:15:33 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 13 fe80::8 store=active . 2022.02.11 22:15:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:15:33 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 13 fe80::8 store=active . 2022.02.11 22:15:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:15:33 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 13 fe80::8 store=active . 2022.02.11 22:15:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:15:33 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 13 fe80::8 store=active . 2022.02.11 22:15:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:15:33 - OpenVPN > Closing TUN/TAP interface . 2022.02.11 22:15:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 22:15:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1252::/64) . 2022.02.11 22:15:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1252::/64 13 fe80::8 store=active . 2022.02.11 22:15:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 13 fde6:7a:7d20:1252::106f store=active . 2022.02.11 22:15:34 - OpenVPN > TAP: DHCP address released . 2022.02.11 22:15:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.11 22:15:34 - Connection terminated. . 2022.02.11 22:15:34 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 22:15:34 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 22:15:34 - DNS IPv4 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 22:15:34 - DNS IPv6 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 22:15:34 - DNS leak protection with packet filtering disabled. . 2022.02.11 22:15:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.11 22:15:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.11 22:15:34 - Flushing DNS ! 2022.02.11 22:15:34 - Session terminated. . 2022.02.11 22:18:45 - Collect information about AirVPN completed . 2022.02.11 22:21:40 - Above log line repeated 1 times more I 2022.02.11 22:21:40 - Session starting. I 2022.02.11 22:21:41 - Checking authorization ... ! 2022.02.11 22:21:42 - Connecting to Merope (United States of America, Los Angeles) . 2022.02.11 22:21:42 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.11 22:21:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.11 22:21:42 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.11 22:21:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 22:21:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 22:21:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 22:21:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 22:21:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.53:443 . 2022.02.11 22:21:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 22:21:42 - OpenVPN > UDP link local: (not bound) . 2022.02.11 22:21:42 - OpenVPN > UDP link remote: [AF_INET]107.167.244.53:443 . 2022.02.11 22:21:44 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.53:443, sid=83e9f60d 0c915a88 . 2022.02.11 22:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 22:21:45 - OpenVPN > VERIFY KU OK . 2022.02.11 22:21:45 - OpenVPN > Validating certificate extended key usage . 2022.02.11 22:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 22:21:45 - OpenVPN > VERIFY EKU OK . 2022.02.11 22:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merope, emailAddress=info@airvpn.org . 2022.02.11 22:21:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 22:21:45 - OpenVPN > [Merope] Peer Connection Initiated with [AF_INET]107.167.244.53:443 . 2022.02.11 22:21:46 - OpenVPN > SENT CONTROL [Merope]: 'PUSH_REQUEST' (status=1) . 2022.02.11 22:21:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.82.1,dhcp-option DNS6 fde6:7a:7d20:1252::1,tun-ipv6,route-gateway 10.22.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1252::106f/64 fde6:7a:7d20:1252::1,ifconfig 10.22.82.113 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.02.11 22:21:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 22:21:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 22:21:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 22:21:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 22:21:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 22:21:46 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 22:21:46 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 22:21:46 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 22:21:46 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 22:21:46 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 22:21:46 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 22:21:46 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 22:21:46 - OpenVPN > open_tun . 2022.02.11 22:21:46 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 22:21:46 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 22:21:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.82.0/10.22.82.113/255.255.255.0 [SUCCEEDED] . 2022.02.11 22:21:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.82.113/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.22.82.254, lease-time: 31536000] . 2022.02.11 22:21:46 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 22:21:46 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 22:21:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:1252::106f/128 store=active . 2022.02.11 22:21:46 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1252::/64 -> fde6:7a:7d20:1252::106f metric 0) dev Local Area Connection . 2022.02.11 22:21:46 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1252::/64 13 fe80::8 store=active . 2022.02.11 22:21:46 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:21:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 22:21:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:1252::1 validate=no . 2022.02.11 22:21:46 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 22:21:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 22:21:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2022.02.11 22:21:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 22:21:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 22:21:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 22:21:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 22:21:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 22:21:51 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 22:21:51 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:21:51 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 22:21:51 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:21:51 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 22:21:51 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:21:51 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1252::1 metric -1) dev Local Area Connection . 2022.02.11 22:21:51 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 22:21:51 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 22:21:51 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 22:21:51 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 22:21:51 - DNS leak protection with packet filtering enabled. . 2022.02.11 22:21:52 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.22.82.1) . 2022.02.11 22:21:52 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:1252::1) . 2022.02.11 22:21:52 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.22.82.1) . 2022.02.11 22:21:52 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:1252::1) . 2022.02.11 22:21:53 - Routes, added a new route, 107.167.244.51 for gateway 10.22.82.1 . 2022.02.11 22:21:53 - Routes, added a new route, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:1252::1 . 2022.02.11 22:21:53 - Flushing DNS I 2022.02.11 22:21:53 - Checking route IPv4 I 2022.02.11 22:21:54 - Checking route IPv6 I 2022.02.11 22:21:59 - Checking DNS ! 2022.02.11 22:22:00 - Connected. . 2022.02.11 22:22:00 - OpenVPN > Initialization Sequence Completed . 2022.02.11 22:49:54 - Collect information about AirVPN completed ! 2022.02.11 23:00:57 - Disconnecting . 2022.02.11 23:00:57 - Routes, removed a route previously added, 107.167.244.51 for gateway 10.22.82.1 . 2022.02.11 23:00:57 - Routes, removed a route previously added, 2605:8681:0:2:f8c7:1adf:d162:1af8 for gateway fde6:7a:7d20:1252::1 . 2022.02.11 23:00:57 - Sending soft termination signal . 2022.02.11 23:01:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\route.exe DELETE 107.167.244.53 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 23:01:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 23:01:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.82.1 . 2022.02.11 23:01:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.11 23:01:02 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 13 fe80::8 store=active . 2022.02.11 23:01:02 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:01:02 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 13 fe80::8 store=active . 2022.02.11 23:01:02 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:01:02 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 13 fe80::8 store=active . 2022.02.11 23:01:02 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:01:02 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 13 fe80::8 store=active . 2022.02.11 23:01:02 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:01:02 - OpenVPN > Closing TUN/TAP interface . 2022.02.11 23:01:02 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 23:01:02 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1252::/64) . 2022.02.11 23:01:02 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1252::/64 13 fe80::8 store=active . 2022.02.11 23:01:02 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 13 fde6:7a:7d20:1252::106f store=active . 2022.02.11 23:01:02 - OpenVPN > TAP: DHCP address released . 2022.02.11 23:01:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.11 23:01:03 - Connection terminated. . 2022.02.11 23:01:03 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 23:01:03 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.11 23:01:03 - DNS IPv4 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 23:01:03 - DNS IPv6 of a network adapter restored to original settings (vEthernet (WSL), to automatic) . 2022.02.11 23:01:03 - DNS leak protection with packet filtering disabled. . 2022.02.11 23:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.11 23:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.11 23:01:03 - Flushing DNS ! 2022.02.11 23:01:03 - Session terminated. I 2022.02.11 23:02:01 - Session starting. I 2022.02.11 23:02:02 - Checking authorization ... ! 2022.02.11 23:02:03 - Connecting to Alkes (United States of America, Los Angeles) . 2022.02.11 23:02:03 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.11 23:02:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.11 23:02:03 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.11 23:02:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 23:02:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 23:02:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.11 23:02:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.11 23:02:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]107.167.244.69:443 . 2022.02.11 23:02:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.11 23:02:03 - OpenVPN > UDP link local: (not bound) . 2022.02.11 23:02:03 - OpenVPN > UDP link remote: [AF_INET]107.167.244.69:443 . 2022.02.11 23:02:03 - OpenVPN > TLS: Initial packet from [AF_INET]107.167.244.69:443, sid=b8a16f7f c48b2f68 . 2022.02.11 23:02:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.11 23:02:03 - OpenVPN > VERIFY KU OK . 2022.02.11 23:02:03 - OpenVPN > Validating certificate extended key usage . 2022.02.11 23:02:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.11 23:02:03 - OpenVPN > VERIFY EKU OK . 2022.02.11 23:02:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkes, emailAddress=info@airvpn.org . 2022.02.11 23:02:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.11 23:02:03 - OpenVPN > [Alkes] Peer Connection Initiated with [AF_INET]107.167.244.69:443 . 2022.02.11 23:02:04 - OpenVPN > SENT CONTROL [Alkes]: 'PUSH_REQUEST' (status=1) . 2022.02.11 23:02:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.178.1,dhcp-option DNS6 fde6:7a:7d20:2b2::1,tun-ipv6,route-gateway 10.6.178.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2b2::1094/64 fde6:7a:7d20:2b2::1,ifconfig 10.6.178.150 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.02.11 23:02:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.11 23:02:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.11 23:02:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.11 23:02:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 23:02:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.11 23:02:04 - OpenVPN > interactive service msg_channel=0 . 2022.02.11 23:02:04 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=4 HWADDR=40:5b:d8:d8:d7:9b . 2022.02.11 23:02:04 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.11 23:02:04 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2022.02.11 23:02:04 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::b69e:80ff:fe4e:cbe5 . 2022.02.11 23:02:04 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.11 23:02:04 - OpenVPN > ROUTE6_GATEWAY fe80::b69e:80ff:fe4e:cbe5 I=4 . 2022.02.11 23:02:04 - OpenVPN > open_tun . 2022.02.11 23:02:04 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.11 23:02:04 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.11 23:02:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.178.0/10.6.178.150/255.255.255.0 [SUCCEEDED] . 2022.02.11 23:02:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.178.150/255.255.255.0 on interface {5423E36C-B556-4D77-9159-51A5D53E7FF5} [DHCP-serv: 10.6.178.254, lease-time: 31536000] . 2022.02.11 23:02:04 - OpenVPN > Successful ARP Flush on interface [13] {5423E36C-B556-4D77-9159-51A5D53E7FF5} . 2022.02.11 23:02:04 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 23:02:04 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 13 fde6:7a:7d20:2b2::1094/128 store=active . 2022.02.11 23:02:05 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2b2::/64 -> fde6:7a:7d20:2b2::1094 metric 0) dev Local Area Connection . 2022.02.11 23:02:05 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2b2::/64 13 fe80::8 store=active . 2022.02.11 23:02:05 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:02:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 13 all . 2022.02.11 23:02:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 13 static fde6:7a:7d20:2b2::1 validate=no . 2022.02.11 23:02:05 - OpenVPN > IPv6 MTU set to 1500 on interface 13 using SetIpInterfaceEntry() . 2022.02.11 23:02:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.11 23:02:10 - OpenVPN > C:\windows\system32\route.exe ADD 107.167.244.69 MASK 255.255.255.255 192.168.2.1 . 2022.02.11 23:02:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2022.02.11 23:02:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 23:02:10 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.178.1 . 2022.02.11 23:02:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 23:02:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 23:02:10 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.178.1 . 2022.02.11 23:02:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.11 23:02:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.11 23:02:10 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:2b2::1 metric -1) dev Local Area Connection . 2022.02.11 23:02:10 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 13 fe80::8 store=active . 2022.02.11 23:02:10 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:02:11 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:2b2::1 metric -1) dev Local Area Connection . 2022.02.11 23:02:11 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 13 fe80::8 store=active . 2022.02.11 23:02:11 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:02:11 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:2b2::1 metric -1) dev Local Area Connection . 2022.02.11 23:02:11 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 13 fe80::8 store=active . 2022.02.11 23:02:11 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:02:11 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:2b2::1 metric -1) dev Local Area Connection . 2022.02.11 23:02:11 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 13 fe80::8 store=active . 2022.02.11 23:02:11 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2022.02.11 23:02:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.11 23:02:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.11 23:02:11 - DNS leak protection with packet filtering enabled. . 2022.02.11 23:02:11 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.6.178.1) . 2022.02.11 23:02:11 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:2b2::1) . 2022.02.11 23:02:11 - DNS IPv4 of a network adapter forced (vEthernet (WSL), from automatic to 10.6.178.1) . 2022.02.11 23:02:11 - DNS IPv6 of a network adapter forced (vEthernet (WSL), from automatic to fde6:7a:7d20:2b2::1) . 2022.02.11 23:02:11 - Routes, added a new route, 107.167.244.67 for gateway 10.6.178.1 . 2022.02.11 23:02:12 - Routes, added a new route, 2605:8681:0:3:17a6:a320:1d5f:e175 for gateway fde6:7a:7d20:2b2::1 . 2022.02.11 23:02:12 - Flushing DNS I 2022.02.11 23:02:12 - Checking route IPv4 I 2022.02.11 23:02:14 - Checking route IPv6 I 2022.02.11 23:02:19 - Checking DNS ! 2022.02.11 23:02:21 - Connected. . 2022.02.11 23:02:21 - OpenVPN > Initialization Sequence Completed . 2022.02.11 23:06:26 - ping 1 . 2022.02.11 23:06:26 - ping 2 W . 2022.02.11 23:06:26 - ping 2 WE . 2022.02.11 23:09:03 - ping 1 . 2022.02.11 23:09:03 - ping 2 W . 2022.02.11 23:09:04 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "192.168.2.1", "metric": "40" }, { "address": "0.0.0.0\/1", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "10.6.178.1", "metric": "3" }, { "address": "10.6.178.0\/24", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "10.6.178.150", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "10.6.178.255", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "107.167.244.67", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "10.6.178.1", "metric": "4" }, { "address": "107.167.244.69", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "192.168.2.1", "metric": "40" }, { "address": "127.0.0.0\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "10.6.178.1", "metric": "3" }, { "address": "185.228.19.147", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "10.25.54.1", "metric": "4" }, { "address": "192.168.2.0\/24", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "192.168.2.3", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "192.168.2.255", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "192.168.128.0\/20", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "192.168.128.1", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "192.168.143.255", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "224.0.0.0\/4", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "224.0.0.0\/4", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "224.0.0.0\/4", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "255.255.255.255", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "255.255.255.255", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "::\/0", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "fe80::b69e:80ff:fe4e:cbe5", "metric": "296" }, { "address": "::\/3", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fe80::8", "metric": "259" }, { "address": "240e:398:26cb:22a0::\/64", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "240e:398:26cb:22a0:c08a:1945:a50d:2edd", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "240e:398:26cb:22a0:c94f:33ea:da9:e95f", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "2602:fe90:100:1d:3609:9c86:a398:2347", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fde6:7a:7d20:1536::1", "metric": "259" }, { "address": "2605:8681:0:3:17a6:a320:1d5f:e175", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fde6:7a:7d20:2b2::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:2b2::\/64", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:2b2::1094", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "fe80::\/64", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "fe80::\/64", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "fe80::48:e3bf:65e3:3a55", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "fe80::2cd2:111f:3795:271c", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "fe80::c94f:33ea:da9:e95f", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "gateway": "link", "metric": "5256" }, { "address": "ff00::\/8", "interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "gateway": "link", "metric": "259" }, { "address": "2602:fe90:100:1d:3609:9c86:a398:2347", "gateway": "fde6:7a:7d20:1536::1", "metric": "4294967295" }, { "address": "2605:8681:0:3:17a6:a320:1d5f:e175", "gateway": "fde6:7a:7d20:2b2::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "68119353808", "bytes_sent": "244018466375", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:2b2::1094", "fe80::2cd2:111f:3795:271c", "10.6.178.150" ], "gateways": [ "10.6.178.1", "10.25.54.1", "fe80::8", "fde6:7a:7d20:1536::1", "fde6:7a:7d20:2b2::1" ], "bind": true, "dns4": "10.6.178.1", "dns6": null }, { "friendly": "Local Area Connection* 9", "id": "{44172B1B-9387-4BAC-8ABF-09BEDDC4EB58}", "name": "Local Area Connection* 9", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::1804:2c3d:2be6:d5f9", "169.254.213.249" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 10", "id": "{4CE136BB-FBA5-45AC-9B24-93134AECB59A}", "name": "Local Area Connection* 10", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a4a7:2822:d852:8ff3", "169.254.143.243" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{2E3D22F9-5364-4ACF-AFE1-6A8FC01B230E}", "name": "Wi-Fi", "description": "Realtek 8822CE Wireless LAN 802.11ac PCI-E NIC", "type": "Wireless80211", "status": "Up", "bytes_received": "3613606869", "bytes_sent": "8800865855", "support_ipv4": true, "support_ipv6": true, "ips": [ "240e:398:26cb:22a0:c94f:33ea:da9:e95f", "240e:398:26cb:22a0:c08a:1945:a50d:2edd", "fe80::c94f:33ea:da9:e95f", "192.168.2.3" ], "gateways": [ "192.168.2.1", "fe80::b69e:80ff:fe4e:cbe5" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{F573D74C-4444-445E-AA0E-05B516A58B00}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a818:77cc:19ab:9501", "169.254.149.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "vEthernet (WSL)", "id": "{C8D5F9C6-ADC1-4CA5-9387-F7452EABE458}", "name": "vEthernet (WSL)", "description": "Hyper-V Virtual Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "15218518", "bytes_sent": "675364956", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::48:e3bf:65e3:3a55", "192.168.128.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.6.178.1", "ipv4-default-interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{5423E36C-B556-4D77-9159-51A5D53E7FF5}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : bluepill Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-54-23-E3-6C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:2b2::1094(Preferred) Link-local IPv6 Address . . . . . : fe80::2cd2:111f:3795:271c%13(Preferred) IPv4 Address. . . . . . . . . . . : 10.6.178.150(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, February 11, 2022 11:02:04 PM Lease Expires . . . . . . . . . . : Saturday, February 11, 2023 11:02:03 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.6.178.254 DHCPv6 IAID . . . . . . . . . . . : 251723604 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-83-68-B9-40-5B-D8-D8-D7-9B DNS Servers . . . . . . . . . . . : fde6:7a:7d20:2b2::1 10.6.178.1 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Local Area Connection* 9: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 40-5B-D8-D8-D7-9B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 10: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : C2-5B-D8-D8-D7-9B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8822CE Wireless LAN 802.11ac PCI-E NIC Physical Address. . . . . . . . . : 40-5B-D8-D8-D7-9B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 240e:398:26cb:22a0:c94f:33ea:da9:e95f(Preferred) Temporary IPv6 Address. . . . . . : 240e:398:26cb:22a0:c08a:1945:a50d:2edd(Preferred) Link-local IPv6 Address . . . . . : fe80::c94f:33ea:da9:e95f%4(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.2.3(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, February 10, 2022 11:11:39 PM Lease Expires . . . . . . . . . . : Saturday, February 12, 2022 10:17:35 PM Default Gateway . . . . . . . . . : fe80::b69e:80ff:fe4e:cbe5%4 192.168.2.1 DHCP Server . . . . . . . . . . . : 192.168.2.1 DHCPv6 IAID . . . . . . . . . . . : 71326680 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-83-68-B9-40-5B-D8-D8-D7-9B DNS Servers . . . . . . . . . . . : fe80::b69e:80ff:fe4e:cbe5%4 192.168.2.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 40-5B-D8-D8-D7-9C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter vEthernet (WSL): Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Hyper-V Virtual Ethernet Adapter Physical Address. . . . . . . . . : 00-15-5D-0B-29-08 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::48:e3bf:65e3:3a55%44(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.128.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.240.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 738202973 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-83-68-B9-40-5B-D8-D8-D7-9B DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . . : Enabled