Eddie System/Environment Report - 2022-05-25 - 1:57 PM UTC Eddie version: 2.21.6 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19044.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\vICTOR\AppData\Local\Eddie\default.profile Data path: C:\Users\vICTOR\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: No OS support IPv4: Yes OS support IPv6: No Detected DNS: 10.35.66.1 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: Failed Test Ping IPv6: Failed Test HTTP IPv4: Error: Fetch url error:Timeout was reached Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Error: Fetch url error:Couldn't resolve host name ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.scoretype: Latency areas.denylist: us proxy.mode: none network.ipv6.mode: block advanced.expert: True ui.unit: bytes ---------------------------- Logs: . 2022.05.25 07:52:38 - Eddie version: 2.21.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.05.25 07:52:38 - Command line arguments (1): path="home" . 2022.05.25 07:52:42 - Reading options from C:\Users\vICTOR\AppData\Local\Eddie\default.profile . 2022.05.25 07:52:44 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.05.25 07:52:44 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.05.25 07:52:44 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2022.05.25 07:52:46 - Activation of Network Lock - Windows Filtering Platform I 2022.05.25 07:52:49 - Ready . 2022.05.25 07:52:51 - Collect information about AirVPN completed I 2022.05.25 07:52:51 - Session starting. . 2022.05.25 07:52:53 - Waiting for latency tests (208 to go) . 2022.05.25 07:52:54 - Collect information about AirVPN completed . 2022.05.25 07:52:55 - Waiting for latency tests (50 to go) I 2022.05.25 07:52:57 - Checking authorization ... . 2022.05.25 07:53:00 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.25 07:53:00 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.25 07:53:00 - IPv6 disabled with packet filtering. ! 2022.05.25 07:53:00 - Connecting to Pisces (Canada, Vancouver) . 2022.05.25 07:53:01 - Routes, add 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.25 07:53:01 - Routes, add 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", already exists. . 2022.05.25 07:53:01 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.25 07:53:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.25 07:53:01 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.25 07:53:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:53:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:53:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:53:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:53:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2022.05.25 07:53:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.25 07:53:01 - OpenVPN > UDP link local: (not bound) . 2022.05.25 07:53:01 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2022.05.25 07:53:01 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=58dc6547 c0739b20 . 2022.05.25 07:53:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.25 07:53:03 - OpenVPN > VERIFY KU OK . 2022.05.25 07:53:03 - OpenVPN > Validating certificate extended key usage . 2022.05.25 07:53:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.25 07:53:03 - OpenVPN > VERIFY EKU OK . 2022.05.25 07:53:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2022.05.25 07:53:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.25 07:53:03 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2022.05.25 07:53:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.226.1,dhcp-option DNS6 fde6:7a:7d20:be2::1,tun-ipv6,route-gateway 10.15.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be2::1011/64 fde6:7a:7d20:be2::1,ifconfig 10.15.226.19 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2022.05.25 07:53:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.25 07:53:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.226.1' . 2022.05.25 07:53:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:be2::1' . 2022.05.25 07:53:04 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.25 07:53:04 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:be2::1011/64 fde6:7a:7d20:be2::1' . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.25 07:53:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.25 07:53:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.25 07:53:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:53:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:53:04 - OpenVPN > interactive service msg_channel=0 . 2022.05.25 07:53:04 - OpenVPN > open_tun . 2022.05.25 07:53:04 - OpenVPN > wintun device [Eddie] opened . 2022.05.25 07:53:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 45 static 10.15.226.19 255.255.255.0 . 2022.05.25 07:53:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 45 all . 2022.05.25 07:53:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 45 all . 2022.05.25 07:53:05 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.25 07:53:05 - OpenVPN > Initialization Sequence Completed . 2022.05.25 07:53:05 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.25 07:53:05 - DNS leak protection with packet filtering enabled. . 2022.05.25 07:53:05 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.15.226.1) . 2022.05.25 07:53:05 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.15.226.1) . 2022.05.25 07:53:05 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:53:05 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:53:06 - Routes, add 192.30.89.27/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:53:06 - Routes, skipped for 2606:9580:103:a:fda7:1f4c:8c40:8c3e : IPv6 blocked. . 2022.05.25 07:53:06 - Flushing DNS I 2022.05.25 07:53:06 - Checking route IPv4 . 2022.05.25 07:53:55 - Checking route (4° try) . 2022.05.25 07:54:20 - Checking route (5° try) E 2022.05.25 07:54:41 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2022.05.25 07:54:41 - Disconnecting . 2022.05.25 07:54:41 - Sending soft termination signal . 2022.05.25 07:54:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.05.25 07:54:46 - OpenVPN > Closing TUN/TAP interface . 2022.05.25 07:54:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 45 10.15.226.19 store=active . 2022.05.25 07:54:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.05.25 07:54:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:47 - Routes, delete 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.25 07:54:47 - Routes, delete 192.30.89.27/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:47 - Routes, skipped for 2606:9580:103:a:fda7:1f4c:8c40:8c3e : IPv6 blocked. . 2022.05.25 07:54:47 - Routes, delete 192.30.89.29/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", not exists. . 2022.05.25 07:54:47 - IPv6 restored with packet filtering. . 2022.05.25 07:54:47 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2022.05.25 07:54:47 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.05.25 07:54:47 - DNS leak protection with packet filtering disabled. . 2022.05.25 07:54:47 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2022.05.25 07:54:47 - Connection terminated. I 2022.05.25 07:54:50 - Checking authorization ... . 2022.05.25 07:54:51 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.25 07:54:51 - IPv6 disabled with packet filtering. ! 2022.05.25 07:54:51 - Connecting to Telescopium (Canada, Vancouver) . 2022.05.25 07:54:51 - Routes, add 192.30.89.53/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.25 07:54:51 - Routes, add 192.30.89.53/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", already exists. . 2022.05.25 07:54:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.25 07:54:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.25 07:54:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.25 07:54:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:54:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:54:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:54:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:54:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2022.05.25 07:54:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.25 07:54:52 - OpenVPN > UDP link local: (not bound) . 2022.05.25 07:54:52 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2022.05.25 07:54:52 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=c98dbdfe 5356e187 . 2022.05.25 07:54:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.25 07:54:52 - OpenVPN > VERIFY KU OK . 2022.05.25 07:54:52 - OpenVPN > Validating certificate extended key usage . 2022.05.25 07:54:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.25 07:54:52 - OpenVPN > VERIFY EKU OK . 2022.05.25 07:54:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2022.05.25 07:54:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.25 07:54:52 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2022.05.25 07:54:53 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2022.05.25 07:54:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.2.1,dhcp-option DNS6 fde6:7a:7d20:f02::1,tun-ipv6,route-gateway 10.19.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f02::1030/64 fde6:7a:7d20:f02::1,ifconfig 10.19.2.50 255.255.255.0,peer-id 11,cipher AES-256-GCM' . 2022.05.25 07:54:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.25 07:54:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.2.1' . 2022.05.25 07:54:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f02::1' . 2022.05.25 07:54:53 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.25 07:54:53 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:f02::1030/64 fde6:7a:7d20:f02::1' . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.25 07:54:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.25 07:54:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.25 07:54:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:54:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:54:53 - OpenVPN > interactive service msg_channel=0 . 2022.05.25 07:54:53 - OpenVPN > open_tun . 2022.05.25 07:54:53 - OpenVPN > wintun device [Eddie] opened . 2022.05.25 07:54:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 45 static 10.19.2.50 255.255.255.0 . 2022.05.25 07:54:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 45 all . 2022.05.25 07:54:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 45 all . 2022.05.25 07:54:53 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.25 07:54:53 - OpenVPN > Initialization Sequence Completed . 2022.05.25 07:54:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.25 07:54:53 - DNS leak protection with packet filtering enabled. . 2022.05.25 07:54:53 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.2.1) . 2022.05.25 07:54:53 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.19.2.1) . 2022.05.25 07:54:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:54 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:54 - Routes, add 192.30.89.51/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:54:54 - Routes, skipped for 2606:9580:100:c:8757:8ee:ec9c:991c : IPv6 blocked. . 2022.05.25 07:54:54 - Flushing DNS I 2022.05.25 07:54:55 - Checking route IPv4 . 2022.05.25 07:55:43 - Checking route (4° try) . 2022.05.25 07:56:08 - Checking route (5° try) E 2022.05.25 07:56:29 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2022.05.25 07:56:29 - Disconnecting . 2022.05.25 07:56:29 - Sending soft termination signal . 2022.05.25 07:56:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.05.25 07:56:34 - OpenVPN > Closing TUN/TAP interface . 2022.05.25 07:56:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 45 10.19.2.50 store=active . 2022.05.25 07:56:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.05.25 07:56:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:35 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:35 - Routes, delete 192.30.89.53/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.25 07:56:35 - Routes, delete 192.30.89.51/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:35 - Routes, skipped for 2606:9580:100:c:8757:8ee:ec9c:991c : IPv6 blocked. . 2022.05.25 07:56:35 - Routes, delete 192.30.89.53/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", not exists. . 2022.05.25 07:56:35 - IPv6 restored with packet filtering. . 2022.05.25 07:56:35 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2022.05.25 07:56:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.05.25 07:56:36 - DNS leak protection with packet filtering disabled. . 2022.05.25 07:56:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2022.05.25 07:56:36 - Connection terminated. I 2022.05.25 07:56:39 - Checking authorization ... . 2022.05.25 07:56:40 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.25 07:56:40 - IPv6 disabled with packet filtering. ! 2022.05.25 07:56:40 - Connecting to Nahn (Canada, Vancouver) . 2022.05.25 07:56:40 - Routes, add 192.30.89.69/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2022.05.25 07:56:40 - Routes, add 192.30.89.69/32 for interface "Local Area Connection (TAP-Windows Adapter V9)", already exists. . 2022.05.25 07:56:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.25 07:56:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.25 07:56:40 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.25 07:56:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:56:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:56:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.25 07:56:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.25 07:56:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443 . 2022.05.25 07:56:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.25 07:56:40 - OpenVPN > UDP link local: (not bound) . 2022.05.25 07:56:40 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443 . 2022.05.25 07:56:40 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=e0ef14ed 5bf4c945 . 2022.05.25 07:56:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.25 07:56:41 - OpenVPN > VERIFY KU OK . 2022.05.25 07:56:41 - OpenVPN > Validating certificate extended key usage . 2022.05.25 07:56:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.25 07:56:41 - OpenVPN > VERIFY EKU OK . 2022.05.25 07:56:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2022.05.25 07:56:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.25 07:56:41 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443 . 2022.05.25 07:56:41 - OpenVPN > SENT CONTROL [Nahn]: 'PUSH_REQUEST' (status=1) . 2022.05.25 07:56:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.66.1,dhcp-option DNS6 fde6:7a:7d20:1f42::1,tun-ipv6,route-gateway 10.35.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f42::107f/64 fde6:7a:7d20:1f42::1,ifconfig 10.35.66.129 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.25 07:56:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.25 07:56:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.66.1' . 2022.05.25 07:56:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f42::1' . 2022.05.25 07:56:41 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.25 07:56:41 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1f42::107f/64 fde6:7a:7d20:1f42::1' . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.25 07:56:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.25 07:56:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.25 07:56:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:56:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.25 07:56:41 - OpenVPN > interactive service msg_channel=0 . 2022.05.25 07:56:41 - OpenVPN > open_tun . 2022.05.25 07:56:41 - OpenVPN > wintun device [Eddie] opened . 2022.05.25 07:56:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 45 static 10.35.66.129 255.255.255.0 . 2022.05.25 07:56:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 45 all . 2022.05.25 07:56:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 45 all . 2022.05.25 07:56:42 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.25 07:56:42 - OpenVPN > Initialization Sequence Completed . 2022.05.25 07:56:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.25 07:56:42 - DNS leak protection with packet filtering enabled. . 2022.05.25 07:56:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.66.1) . 2022.05.25 07:56:42 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.35.66.1) . 2022.05.25 07:56:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:42 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:43 - Routes, add 192.30.89.67/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.25 07:56:43 - Routes, skipped for 2606:9580:100:e:d075:a67e:1f9c:139d : IPv6 blocked. . 2022.05.25 07:56:43 - Flushing DNS I 2022.05.25 07:56:43 - Checking route IPv4 . 2022.05.25 07:57:10 - Checking route (4° try) . 2022.05.25 07:57:35 - Checking route (5° try) ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface_index": 8, "metric": 256, "interface": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface_index": 18, "metric": 0, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "0.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "10.35.66.0\/24", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "10.35.66.129\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "10.35.66.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "128.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "169.254.0.0\/16", "gateway": "0.0.0.0", "interface_index": 18, "metric": 306, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "169.254.0.0\/16", "gateway": "0.0.0.0", "interface_index": 45, "metric": 328, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "169.254.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "169.254.255.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "192.30.89.67\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "192.30.89.69\/32", "gateway": "192.168.1.1", "interface_index": 8, "metric": 0, "interface": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "192.168.1.107\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{991BA38F-5311-4265-AF56-64051922E8FC}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{E5B8782E-EF36-4090-9361-5056D6630A90}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2BEB663E-4DCF-4DCB-919E-50DF37403CB8}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{B929E5CF-035E-4B50-AA9D-3352A6BDAE5E}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D3D08A95-C777-40E1-97A9-D465818B88CD}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{991BA38F-5311-4265-AF56-64051922E8FC}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{E5B8782E-EF36-4090-9361-5056D6630A90}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2BEB663E-4DCF-4DCB-919E-50DF37403CB8}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{B929E5CF-035E-4B50-AA9D-3352A6BDAE5E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}", "interfaces": [ { "friendly": "Eddie", "id": "{19FC5368-CEC2-4288-B376-BCE9CD7F905E}", "name": "Eddie", "description": "Eddie Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "264", "bytes_sent": "148281", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.35.66.129" ], "bind": true, "dns4": "10.35.66.1", "dns6": null }, { "friendly": "Ethernet", "id": "{D3D08A95-C777-40E1-97A9-D465818B88CD}", "name": "Ethernet", "description": "Realtek PCIe GBE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "4312137676", "bytes_sent": "335222653", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.107" ], "bind": true, "dns4": "10.35.66.1", "dns6": null }, { "friendly": "Local Area Connection", "id": "{64680D02-1487-4B6C-BE1B-237F37EC93D0}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.1.102" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{E5B8782E-EF36-4090-9361-5056D6630A90}", "name": "Wi-Fi", "description": "Broadcom BCM4352HMB 802.11ac 2x2 Wi-Fi Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.8.34" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 10", "id": "{2BEB663E-4DCF-4DCB-919E-50DF37403CB8}", "name": "Local Area Connection* 10", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.145.31" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 11", "id": "{B929E5CF-035E-4B50-AA9D-3352A6BDAE5E}", "name": "Local Area Connection* 11", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.54.97" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{991BA38F-5311-4265-AF56-64051922E8FC}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.116.58" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{408BA5D4-BEA0-11E7-BD1C-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Veep Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : teksavvy.com Unknown adapter Eddie: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Eddie Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 10.35.66.129(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : 10.35.66.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : teksavvy.com Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 78-E3-B5-C4-B6-37 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 192.168.1.107(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Wednesday, May 25, 2022 7:47:30 AM Lease Expires . . . . . . . . . . : Thursday, May 26, 2022 7:47:29 AM Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DNS Servers . . . . . . . . . . . : 10.35.66.1 NetBIOS over Tcpip. . . . . . . . : Enabled Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-64-68-0D-02 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Broadcom BCM4352HMB 802.11ac 2x2 Wi-Fi Adapter Physical Address. . . . . . . . . : 24-0A-64-A0-A1-84 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 10: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 26-0A-64-A0-A1-84 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 26-0A-64-A0-A9-84 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 00-E0-4C-D7-6C-03 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes