. 2022.05.08 11:52:08 - Eddie version: 2.21.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.05.08 11:52:08 - Command line arguments (1): path="home" . 2022.05.08 11:52:09 - Reading options from C:\Users\vICTOR\AppData\Local\Eddie\default.profile . 2022.05.08 11:52:10 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.05.08 11:52:10 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.05.08 11:52:10 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2022.05.08 11:52:11 - Activation of Network Lock - Windows Filtering Platform I 2022.05.08 11:52:11 - Ready . 2022.05.08 11:52:12 - Collect information about AirVPN completed I 2022.05.08 11:52:13 - Session starting. . 2022.05.08 11:52:13 - Waiting for latency tests (1 to go) . 2022.05.08 11:52:14 - Collect information about AirVPN completed I 2022.05.08 11:52:16 - Checking authorization ... . 2022.05.08 11:52:17 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.08 11:52:17 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.08 11:52:17 - IPv6 disabled with packet filtering. ! 2022.05.08 11:52:17 - Connecting to Titawin (Canada, Vancouver) . 2022.05.08 11:52:17 - Routes, add 192.30.89.61/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.08 11:52:17 - Routes, add 192.30.89.61/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", already exists. . 2022.05.08 11:52:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.08 11:52:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.08 11:52:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.08 11:52:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.08 11:52:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.08 11:52:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.08 11:52:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.08 11:52:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2022.05.08 11:52:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.08 11:52:18 - OpenVPN > UDP link local: (not bound) . 2022.05.08 11:52:18 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2022.05.08 11:52:18 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=92cf57d8 f5d6a384 . 2022.05.08 11:52:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.08 11:52:18 - OpenVPN > VERIFY KU OK . 2022.05.08 11:52:18 - OpenVPN > Validating certificate extended key usage . 2022.05.08 11:52:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.08 11:52:18 - OpenVPN > VERIFY EKU OK . 2022.05.08 11:52:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2022.05.08 11:52:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.08 11:52:18 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443 . 2022.05.08 11:52:18 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2022.05.08 11:52:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.66.1,dhcp-option DNS6 fde6:7a:7d20:1042::1,tun-ipv6,route-gateway 10.20.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1042::109b/64 fde6:7a:7d20:1042::1,ifconfig 10.20.66.157 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.05.08 11:52:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.08 11:52:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.66.1' . 2022.05.08 11:52:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1042::1' . 2022.05.08 11:52:18 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.08 11:52:18 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1042::109b/64 fde6:7a:7d20:1042::1' . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.08 11:52:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.08 11:52:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.08 11:52:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.08 11:52:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.08 11:52:18 - OpenVPN > interactive service msg_channel=0 . 2022.05.08 11:52:18 - OpenVPN > open_tun . 2022.05.08 11:52:18 - OpenVPN > wintun device [Eddie] opened . 2022.05.08 11:52:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 45 static 10.20.66.157 255.255.255.0 . 2022.05.08 11:52:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 45 all . 2022.05.08 11:52:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 45 all . 2022.05.08 11:52:19 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.08 11:52:19 - OpenVPN > Initialization Sequence Completed . 2022.05.08 11:52:19 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.08 11:52:19 - DNS leak protection with packet filtering enabled. . 2022.05.08 11:52:19 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.20.66.1) . 2022.05.08 11:52:19 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.66.1) . 2022.05.08 11:52:19 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:52:19 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:52:20 - Routes, add 192.30.89.59/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:52:20 - Routes, skipped for 2606:9580:100:d:2bd7:c37b:24c2:c069 : IPv6 blocked. . 2022.05.08 11:52:20 - Flushing DNS I 2022.05.08 11:52:21 - Checking route IPv4 . 2022.05.08 11:52:48 - Checking route (4° try) . 2022.05.08 11:53:13 - Checking route (5° try) E 2022.05.08 11:53:34 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2022.05.08 11:53:34 - Disconnecting . 2022.05.08 11:53:34 - Sending soft termination signal . 2022.05.08 11:53:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.05.08 11:53:39 - OpenVPN > Closing TUN/TAP interface . 2022.05.08 11:53:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 45 10.20.66.157 store=active . 2022.05.08 11:53:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.05.08 11:53:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:40 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:40 - Routes, delete 192.30.89.61/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.08 11:53:40 - Routes, delete 192.30.89.59/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:40 - Routes, skipped for 2606:9580:100:d:2bd7:c37b:24c2:c069 : IPv6 blocked. . 2022.05.08 11:53:40 - Routes, delete 192.30.89.61/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", not exists. . 2022.05.08 11:53:40 - IPv6 restored with packet filtering. . 2022.05.08 11:53:41 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2022.05.08 11:53:41 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.05.08 11:53:41 - DNS leak protection with packet filtering disabled. . 2022.05.08 11:53:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2022.05.08 11:53:41 - Connection terminated. I 2022.05.08 11:53:44 - Checking authorization ... . 2022.05.08 11:53:45 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.08 11:53:45 - IPv6 disabled with packet filtering. ! 2022.05.08 11:53:45 - Connecting to Pisces (Canada, Vancouver) . 2022.05.08 11:53:45 - Routes, add 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.08 11:53:45 - Routes, add 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", already exists. . 2022.05.08 11:53:45 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.08 11:53:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.08 11:53:45 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.08 11:53:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.08 11:53:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.08 11:53:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.08 11:53:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.08 11:53:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2022.05.08 11:53:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.08 11:53:45 - OpenVPN > UDP link local: (not bound) . 2022.05.08 11:53:45 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2022.05.08 11:53:45 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=49ef2ab0 86af733d . 2022.05.08 11:53:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.08 11:53:46 - OpenVPN > VERIFY KU OK . 2022.05.08 11:53:46 - OpenVPN > Validating certificate extended key usage . 2022.05.08 11:53:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.08 11:53:46 - OpenVPN > VERIFY EKU OK . 2022.05.08 11:53:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2022.05.08 11:53:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.08 11:53:46 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2022.05.08 11:53:46 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1) . 2022.05.08 11:53:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.226.1,dhcp-option DNS6 fde6:7a:7d20:be2::1,tun-ipv6,route-gateway 10.15.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be2::10aa/64 fde6:7a:7d20:be2::1,ifconfig 10.15.226.172 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2022.05.08 11:53:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.08 11:53:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.226.1' . 2022.05.08 11:53:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:be2::1' . 2022.05.08 11:53:46 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.08 11:53:46 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:be2::10aa/64 fde6:7a:7d20:be2::1' . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.08 11:53:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.08 11:53:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.08 11:53:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.08 11:53:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.08 11:53:46 - OpenVPN > interactive service msg_channel=0 . 2022.05.08 11:53:46 - OpenVPN > open_tun . 2022.05.08 11:53:46 - OpenVPN > wintun device [Eddie] opened . 2022.05.08 11:53:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 45 static 10.15.226.172 255.255.255.0 . 2022.05.08 11:53:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 45 all . 2022.05.08 11:53:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 45 all . 2022.05.08 11:53:46 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.08 11:53:46 - OpenVPN > Initialization Sequence Completed . 2022.05.08 11:53:46 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.08 11:53:46 - DNS leak protection with packet filtering enabled. . 2022.05.08 11:53:47 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.15.226.1) . 2022.05.08 11:53:47 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.15.226.1) . 2022.05.08 11:53:47 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:47 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:47 - Routes, add 192.30.89.27/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.08 11:53:47 - Routes, skipped for 2606:9580:103:a:fda7:1f4c:8c40:8c3e : IPv6 blocked. . 2022.05.08 11:53:47 - Flushing DNS I 2022.05.08 11:53:48 - Checking route IPv4 . 2022.05.08 11:54:15 - Checking route (4° try)