. 2022.05.27 12:38:23 - Shutdown in progress . 2022.05.27 12:38:23 - Elevated: Client soft disconnected . 2022.05.27 12:38:24 - Shutdown complete . 2022.05.27 12:39:18 - Reading options from C:\Users\ProphetPX\AppData\Local\Eddie\default.profile . 2022.05.27 12:39:20 - Elevated: Command:wfp . 2022.05.27 12:39:20 - Elevated: Command:wfp . 2022.05.27 12:39:20 - Exec(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version'; . 2022.05.27 12:39:20 - Exec(1) done in 125 ms, exit: 0, out: 'OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:39:20 - library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:39:20 - Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:39:20 - Originally developed by James Yonan . 2022.05.27 12:39:20 - Copyright (C) 2002-2021 OpenVPN Inc . 2022.05.27 12:39:20 - Compile time defines: N/A' . 2022.05.27 12:39:20 - Exec(2) of 'C:\Program Files\OpenSSH-Win64\ssh.exe', 1 args: '-V'; . 2022.05.27 12:39:20 - Exec(2) done in 422 ms, exit: 0, err: 'OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5' . 2022.05.27 12:39:20 - Exec(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version'; . 2022.05.27 12:39:20 - Exec(3) done in 110 ms, exit: 0, err: 'stunnel 5.56 on x86-pc-mingw32-gnu platform . 2022.05.27 12:39:20 - Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2022.05.27 12:39:20 - Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2022.05.27 12:39:20 - Global options: . 2022.05.27 12:39:20 - RNDbytes = 1024 . 2022.05.27 12:39:20 - RNDoverwrite = yes . 2022.05.27 12:39:20 - taskbar = yes . 2022.05.27 12:39:20 - Service-level options: . 2022.05.27 12:39:20 - ciphers = HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK . 2022.05.27 12:39:20 - ciphersuites = TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256 (with TLSv1.3) . 2022.05.27 12:39:20 - curves = X25519:P-256:X448:P-521:P-384 . 2022.05.27 12:39:20 - debug = notice . 2022.05.27 12:39:20 - logId = sequential . 2022.05.27 12:39:20 - options = NO_SSLv2 . 2022.05.27 12:39:20 - options = NO_SSLv3 . 2022.05.27 12:39:20 - sessionCacheSize = 1000 . 2022.05.27 12:39:20 - sessionCacheTimeout = 300 seconds . 2022.05.27 12:39:20 - stack = 65536 bytes . 2022.05.27 12:39:20 - TIMEOUTbusy = 300 seconds . 2022.05.27 12:39:20 - TIMEOUTclose = 60 seconds . 2022.05.27 12:39:20 - TIMEOUTconnect = 10 seconds . 2022.05.27 12:39:20 - TIMEOUTidle = 43200 seconds . 2022.05.27 12:39:20 - verify = none' . 2022.05.27 12:39:20 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.05.27 12:39:20 - SSH - Version: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe) . 2022.05.27 12:39:20 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2022.05.27 12:39:20 - Elevated: Command:wfp . 2022.05.27 12:39:22 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'WFP Show Filters file="D:\TEMP\\eddie_tmp_wfp_rules.xml"', exit:0, out:'Data collection successful; output = D:\TEMP\\eddie_tmp_wfp_rules.xml' . 2022.05.27 12:39:23 - Elevated: Command:wintun-adapter-removepool I 2022.05.27 12:39:24 - Ready . 2022.05.27 12:39:26 - Collect information about AirVPN completed I 2022.05.27 12:39:58 - Checking login ... ! 2022.05.27 12:39:59 - Logged in. ! 2022.05.27 12:40:10 - Activation of Network Lock - Windows Filtering Platform . 2022.05.27 12:40:10 - Elevated: Command:wfp . 2022.05.27 12:40:10 - Elevated: Command:wfp . 2022.05.27 12:40:10 - Elevated: Command:wfp . 2022.05.27 12:40:19 - Above log line repeated 49 times more I 2022.05.27 12:40:19 - Session starting. I 2022.05.27 12:40:22 - Checking authorization ... . 2022.05.27 12:40:23 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:40:24 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:40:24 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:40:24 - Elevated: Command:wfp . 2022.05.27 12:40:24 - Elevated: Command:wfp . 2022.05.27 12:40:24 - Elevated: Command:wfp . 2022.05.27 12:40:24 - Above log line repeated 3 times more . 2022.05.27 12:40:24 - IPv6 disabled with packet filtering. ! 2022.05.27 12:40:24 - Connecting to Tyl (Canada, Toronto, Ontario) . 2022.05.27 12:40:25 - Elevated: Command:route-list . 2022.05.27 12:40:25 - Elevated: Command:route . 2022.05.27 12:40:25 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.223.205/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:40:25 - Routes, add 184.75.223.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:40:26 - Elevated: Command:route-list . 2022.05.27 12:40:26 - Routes, add 184.75.223.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:40:26 - Elevated: Command:wfp . 2022.05.27 12:40:26 - Elevated: Command:wfp . 2022.05.27 12:40:26 - Elevated: Command:wfp . 2022.05.27 12:40:26 - Above log line repeated 3 times more . 2022.05.27 12:40:26 - Elevated: Command:openvpn . 2022.05.27 12:40:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:40:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:40:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:40:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:40:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:40:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:40:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:40:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443 . 2022.05.27 12:40:26 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:40:26 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:40:26 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443 . 2022.05.27 12:40:26 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=fff12e99 b2ddf727 . 2022.05.27 12:40:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:40:26 - OpenVPN > VERIFY KU OK . 2022.05.27 12:40:26 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:40:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:40:26 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:40:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org . 2022.05.27 12:40:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:40:26 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443 . 2022.05.27 12:40:27 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:40:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.218.1,dhcp-option DNS6 fde6:7a:7d20:1bda::1,tun-ipv6,route-gateway 10.31.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bda::109d/64 fde6:7a:7d20:1bda::1,ifconfig 10.31.218.159 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2022.05.27 12:40:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:40:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.218.1' . 2022.05.27 12:40:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bda::1' . 2022.05.27 12:40:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:40:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1bda::109d/64 fde6:7a:7d20:1bda::1' . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:40:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:40:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:40:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:40:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:40:27 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:40:27 - OpenVPN > open_tun . 2022.05.27 12:40:27 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:40:27 - Elevated: Command:wfp . 2022.05.27 12:40:30 - Elevated: Command:wfp . 2022.05.27 12:40:30 - Elevated: Command:wfp . 2022.05.27 12:40:30 - Above log line repeated 3 times more . 2022.05.27 12:40:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.31.218.159 255.255.255.0 . 2022.05.27 12:40:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:40:30 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:40:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:40:35 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:40:39 - OpenVPN > NETSH: command failed . 2022.05.27 12:40:39 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:40:39 - Disconnecting . 2022.05.27 12:40:40 - Elevated: Command:route-list . 2022.05.27 12:40:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:40:41 - Elevated: Command:route-list . 2022.05.27 12:40:41 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:40:41 - Elevated: Command:route-list . 2022.05.27 12:40:42 - Elevated: Command:route . 2022.05.27 12:40:43 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.223.205/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:40:43 - Routes, delete 184.75.223.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:40:43 - Elevated: Command:route-list . 2022.05.27 12:40:43 - Routes, delete 184.75.223.203/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:40:43 - Routes, skipped for 2606:6080:1002:5:a1ba:b510:7908:829e : IPv6 blocked. . 2022.05.27 12:40:44 - Elevated: Command:route-list . 2022.05.27 12:40:44 - Routes, delete 184.75.223.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:40:44 - Running event vpn.down . 2022.05.27 12:40:44 - Elevated: Command:wfp . 2022.05.27 12:40:44 - Elevated: Command:wfp . 2022.05.27 12:40:44 - Elevated: Command:wfp . 2022.05.27 12:40:44 - Above log line repeated 3 times more . 2022.05.27 12:40:44 - IPv6 restored with packet filtering. . 2022.05.27 12:40:44 - Elevated: Command:wfp . 2022.05.27 12:40:45 - Elevated: Command:wfp . 2022.05.27 12:40:45 - Elevated: Command:wfp . 2022.05.27 12:40:45 - Above log line repeated 9 times more . 2022.05.27 12:40:45 - Connection terminated. I 2022.05.27 12:40:48 - Checking authorization ... . 2022.05.27 12:40:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:40:49 - Elevated: Command:wfp . 2022.05.27 12:40:49 - Elevated: Command:wfp . 2022.05.27 12:40:49 - Elevated: Command:wfp . 2022.05.27 12:40:49 - Above log line repeated 3 times more . 2022.05.27 12:40:49 - IPv6 disabled with packet filtering. ! 2022.05.27 12:40:49 - Connecting to Lesath (Canada, Toronto, Ontario) . 2022.05.27 12:40:49 - Elevated: Command:route-list . 2022.05.27 12:40:49 - Elevated: Command:route . 2022.05.27 12:40:49 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.5/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:40:49 - Routes, add 184.75.221.5/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:40:50 - Elevated: Command:route-list . 2022.05.27 12:40:50 - Routes, add 184.75.221.5/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:40:50 - Elevated: Command:wfp . 2022.05.27 12:40:50 - Elevated: Command:wfp . 2022.05.27 12:40:50 - Elevated: Command:wfp . 2022.05.27 12:40:50 - Above log line repeated 3 times more . 2022.05.27 12:40:50 - Elevated: Command:openvpn . 2022.05.27 12:40:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:40:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:40:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:40:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:40:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:40:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:40:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:40:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2022.05.27 12:40:50 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:40:50 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:40:50 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443 . 2022.05.27 12:40:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=a1615c9a 00c7bf5b . 2022.05.27 12:40:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:40:50 - OpenVPN > VERIFY KU OK . 2022.05.27 12:40:50 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:40:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:40:50 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:40:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2022.05.27 12:40:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:40:50 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2022.05.27 12:40:51 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:40:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::10e7/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.233 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2022.05.27 12:40:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:40:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.250.1' . 2022.05.27 12:40:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:10fa::1' . 2022.05.27 12:40:51 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:40:51 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:10fa::10e7/64 fde6:7a:7d20:10fa::1' . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:40:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:40:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:40:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:40:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:40:51 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:40:51 - OpenVPN > open_tun . 2022.05.27 12:40:51 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:40:51 - Elevated: Command:wfp . 2022.05.27 12:40:55 - Elevated: Command:wfp . 2022.05.27 12:40:56 - Elevated: Command:wfp . 2022.05.27 12:40:56 - Above log line repeated 3 times more . 2022.05.27 12:40:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.20.250.233 255.255.255.0 . 2022.05.27 12:40:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:40:56 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:40:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:40:58 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:41:02 - OpenVPN > NETSH: command failed . 2022.05.27 12:41:02 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:41:02 - Disconnecting . 2022.05.27 12:41:03 - Elevated: Command:route-list . 2022.05.27 12:41:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:03 - Elevated: Command:route-list . 2022.05.27 12:41:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:04 - Elevated: Command:route-list . 2022.05.27 12:41:04 - Elevated: Command:route . 2022.05.27 12:41:05 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.5/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:05 - Routes, delete 184.75.221.5/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:05 - Elevated: Command:route-list . 2022.05.27 12:41:05 - Routes, delete 184.75.221.3/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:05 - Routes, skipped for 2606:6080:1001:d:c59c:6e9a:3115:6f2f : IPv6 blocked. . 2022.05.27 12:41:06 - Elevated: Command:route-list . 2022.05.27 12:41:06 - Routes, delete 184.75.221.5/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:41:06 - Running event vpn.down . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Above log line repeated 3 times more . 2022.05.27 12:41:07 - IPv6 restored with packet filtering. . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Elevated: Command:wfp . 2022.05.27 12:41:07 - Above log line repeated 9 times more . 2022.05.27 12:41:07 - Connection terminated. I 2022.05.27 12:41:10 - Checking authorization ... . 2022.05.27 12:41:11 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:41:11 - Elevated: Command:wfp . 2022.05.27 12:41:11 - Elevated: Command:wfp . 2022.05.27 12:41:11 - Elevated: Command:wfp . 2022.05.27 12:41:12 - Above log line repeated 3 times more . 2022.05.27 12:41:12 - IPv6 disabled with packet filtering. ! 2022.05.27 12:41:12 - Connecting to Lacerta (Canada, Montreal) . 2022.05.27 12:41:12 - Elevated: Command:route-list . 2022.05.27 12:41:12 - Elevated: Command:route . 2022.05.27 12:41:12 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="87.101.92.173/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:12 - Routes, add 87.101.92.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:13 - Elevated: Command:route-list . 2022.05.27 12:41:13 - Routes, add 87.101.92.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:41:13 - Elevated: Command:wfp . 2022.05.27 12:41:13 - Elevated: Command:wfp . 2022.05.27 12:41:13 - Elevated: Command:wfp . 2022.05.27 12:41:13 - Above log line repeated 3 times more . 2022.05.27 12:41:13 - Elevated: Command:openvpn . 2022.05.27 12:41:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:41:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:41:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:41:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]87.101.92.173:443 . 2022.05.27 12:41:13 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:41:13 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:41:13 - OpenVPN > UDP link remote: [AF_INET]87.101.92.173:443 . 2022.05.27 12:41:13 - OpenVPN > TLS: Initial packet from [AF_INET]87.101.92.173:443, sid=443b37a7 347aafcf . 2022.05.27 12:41:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:41:13 - OpenVPN > VERIFY KU OK . 2022.05.27 12:41:13 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:41:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:41:13 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:41:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacerta, emailAddress=info@airvpn.org . 2022.05.27 12:41:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:41:13 - OpenVPN > [Lacerta] Peer Connection Initiated with [AF_INET]87.101.92.173:443 . 2022.05.27 12:41:14 - OpenVPN > SENT CONTROL [Lacerta]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:41:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.10.1,dhcp-option DNS6 fde6:7a:7d20:70a::1,tun-ipv6,route-gateway 10.11.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:70a::102f/64 fde6:7a:7d20:70a::1,ifconfig 10.11.10.49 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.05.27 12:41:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:41:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.10.1' . 2022.05.27 12:41:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:70a::1' . 2022.05.27 12:41:14 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:41:14 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:70a::102f/64 fde6:7a:7d20:70a::1' . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:41:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:41:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:41:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:41:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:41:14 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:41:14 - OpenVPN > open_tun . 2022.05.27 12:41:14 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:41:14 - Elevated: Command:wfp . 2022.05.27 12:41:17 - Elevated: Command:wfp . 2022.05.27 12:41:17 - Elevated: Command:wfp . 2022.05.27 12:41:17 - Above log line repeated 3 times more . 2022.05.27 12:41:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.11.10.49 255.255.255.0 . 2022.05.27 12:41:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:41:17 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:41:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:41:21 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:41:25 - OpenVPN > NETSH: command failed . 2022.05.27 12:41:25 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:41:25 - Disconnecting . 2022.05.27 12:41:26 - Elevated: Command:route-list . 2022.05.27 12:41:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:26 - Elevated: Command:route-list . 2022.05.27 12:41:26 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:27 - Elevated: Command:route-list . 2022.05.27 12:41:27 - Elevated: Command:route . 2022.05.27 12:41:28 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="87.101.92.173/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:28 - Routes, delete 87.101.92.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:28 - Elevated: Command:route-list . 2022.05.27 12:41:28 - Routes, delete 87.101.92.171/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:28 - Routes, skipped for 2a0d:5600:9:9:5743:305a:39ac:45f6 : IPv6 blocked. . 2022.05.27 12:41:29 - Elevated: Command:route-list . 2022.05.27 12:41:29 - Routes, delete 87.101.92.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:41:29 - Running event vpn.down . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Above log line repeated 3 times more . 2022.05.27 12:41:29 - IPv6 restored with packet filtering. . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Elevated: Command:wfp . 2022.05.27 12:41:29 - Above log line repeated 9 times more . 2022.05.27 12:41:29 - Connection terminated. I 2022.05.27 12:41:33 - Checking authorization ... . 2022.05.27 12:41:34 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:41:34 - Elevated: Command:wfp . 2022.05.27 12:41:34 - Elevated: Command:wfp . 2022.05.27 12:41:34 - Elevated: Command:wfp . 2022.05.27 12:41:34 - Above log line repeated 3 times more . 2022.05.27 12:41:34 - IPv6 disabled with packet filtering. ! 2022.05.27 12:41:34 - Connecting to Sargas (Canada, Toronto, Ontario) . 2022.05.27 12:41:34 - Elevated: Command:route-list . 2022.05.27 12:41:34 - Elevated: Command:route . 2022.05.27 12:41:34 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.223.197/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:34 - Routes, add 184.75.223.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:35 - Elevated: Command:route-list . 2022.05.27 12:41:35 - Routes, add 184.75.223.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:41:35 - Elevated: Command:wfp . 2022.05.27 12:41:35 - Elevated: Command:wfp . 2022.05.27 12:41:35 - Elevated: Command:wfp . 2022.05.27 12:41:35 - Above log line repeated 3 times more . 2022.05.27 12:41:35 - Elevated: Command:openvpn . 2022.05.27 12:41:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:41:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:41:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:41:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2022.05.27 12:41:35 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:41:35 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:41:35 - OpenVPN > UDP link remote: [AF_INET]184.75.223.197:443 . 2022.05.27 12:41:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=e5f213bd 8685c697 . 2022.05.27 12:41:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:41:35 - OpenVPN > VERIFY KU OK . 2022.05.27 12:41:35 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:41:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:41:35 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:41:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2022.05.27 12:41:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:41:36 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2022.05.27 12:41:38 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:41:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.58.1,dhcp-option DNS6 fde6:7a:7d20:193a::1,tun-ipv6,route-gateway 10.29.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:193a::10e2/64 fde6:7a:7d20:193a::1,ifconfig 10.29.58.228 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.27 12:41:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:41:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.58.1' . 2022.05.27 12:41:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:193a::1' . 2022.05.27 12:41:38 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:41:38 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:193a::10e2/64 fde6:7a:7d20:193a::1' . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:41:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:41:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:41:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:41:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:41:38 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:41:38 - OpenVPN > open_tun . 2022.05.27 12:41:38 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:41:38 - Elevated: Command:wfp . 2022.05.27 12:41:42 - Elevated: Command:wfp . 2022.05.27 12:41:42 - Elevated: Command:wfp . 2022.05.27 12:41:43 - Above log line repeated 3 times more . 2022.05.27 12:41:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.29.58.228 255.255.255.0 . 2022.05.27 12:41:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:41:43 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:41:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:41:45 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:41:49 - OpenVPN > NETSH: command failed . 2022.05.27 12:41:49 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:41:49 - Disconnecting . 2022.05.27 12:41:50 - Elevated: Command:route-list . 2022.05.27 12:41:50 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:51 - Elevated: Command:route-list . 2022.05.27 12:41:51 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:51 - Elevated: Command:route-list . 2022.05.27 12:41:51 - Elevated: Command:route . 2022.05.27 12:41:52 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.223.197/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:52 - Routes, delete 184.75.223.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:52 - Elevated: Command:route-list . 2022.05.27 12:41:52 - Routes, delete 184.75.223.195/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:41:52 - Routes, skipped for 2606:6080:1002:4:88e7:e893:3692:25d2 : IPv6 blocked. . 2022.05.27 12:41:53 - Elevated: Command:route-list . 2022.05.27 12:41:53 - Routes, delete 184.75.223.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:41:53 - Running event vpn.down . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Above log line repeated 3 times more . 2022.05.27 12:41:54 - IPv6 restored with packet filtering. . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Elevated: Command:wfp . 2022.05.27 12:41:54 - Above log line repeated 9 times more . 2022.05.27 12:41:54 - Connection terminated. I 2022.05.27 12:41:57 - Checking authorization ... . 2022.05.27 12:41:58 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:41:58 - Elevated: Command:wfp . 2022.05.27 12:41:58 - Elevated: Command:wfp . 2022.05.27 12:41:58 - Elevated: Command:wfp . 2022.05.27 12:41:58 - Above log line repeated 3 times more . 2022.05.27 12:41:58 - IPv6 disabled with packet filtering. ! 2022.05.27 12:41:58 - Connecting to Rotanev (Canada, Toronto, Ontario) . 2022.05.27 12:41:58 - Elevated: Command:route-list . 2022.05.27 12:41:58 - Elevated: Command:route . 2022.05.27 12:41:59 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="104.254.90.189/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:41:59 - Routes, add 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:41:59 - Elevated: Command:route-list . 2022.05.27 12:41:59 - Routes, add 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:41:59 - Elevated: Command:wfp . 2022.05.27 12:41:59 - Elevated: Command:wfp . 2022.05.27 12:41:59 - Elevated: Command:wfp . 2022.05.27 12:41:59 - Above log line repeated 3 times more . 2022.05.27 12:41:59 - Elevated: Command:openvpn . 2022.05.27 12:41:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:41:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:41:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:41:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:41:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:41:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443 . 2022.05.27 12:41:59 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:41:59 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:41:59 - OpenVPN > UDP link remote: [AF_INET]104.254.90.189:443 . 2022.05.27 12:41:59 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=c11f9ffd 607cd541 . 2022.05.27 12:41:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:41:59 - OpenVPN > VERIFY KU OK . 2022.05.27 12:41:59 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:41:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:41:59 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:41:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org . 2022.05.27 12:42:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:42:00 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443 . 2022.05.27 12:42:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.90.1,dhcp-option DNS6 fde6:7a:7d20:185a::1,tun-ipv6,route-gateway 10.28.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:185a::1072/64 fde6:7a:7d20:185a::1,ifconfig 10.28.90.116 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2022.05.27 12:42:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:42:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.90.1' . 2022.05.27 12:42:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:185a::1' . 2022.05.27 12:42:00 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:42:00 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:185a::1072/64 fde6:7a:7d20:185a::1' . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:42:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:42:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:42:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:00 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:42:00 - OpenVPN > open_tun . 2022.05.27 12:42:00 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:42:00 - Elevated: Command:wfp . 2022.05.27 12:42:03 - Elevated: Command:wfp . 2022.05.27 12:42:03 - Elevated: Command:wfp . 2022.05.27 12:42:03 - Above log line repeated 3 times more . 2022.05.27 12:42:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.28.90.116 255.255.255.0 . 2022.05.27 12:42:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:42:04 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:42:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:42:07 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:42:11 - OpenVPN > NETSH: command failed . 2022.05.27 12:42:11 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:42:11 - Disconnecting . 2022.05.27 12:42:12 - Elevated: Command:route-list . 2022.05.27 12:42:12 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:12 - Elevated: Command:route-list . 2022.05.27 12:42:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:13 - Elevated: Command:route-list . 2022.05.27 12:42:13 - Elevated: Command:route . 2022.05.27 12:42:13 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="104.254.90.189/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:42:13 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:42:14 - Elevated: Command:route-list . 2022.05.27 12:42:14 - Routes, delete 104.254.90.187/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:14 - Routes, skipped for 2606:6080:2001:5:48ec:2d6:cc35:3864 : IPv6 blocked. . 2022.05.27 12:42:14 - Elevated: Command:route-list . 2022.05.27 12:42:14 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:42:14 - Running event vpn.down . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Above log line repeated 3 times more . 2022.05.27 12:42:15 - IPv6 restored with packet filtering. . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Elevated: Command:wfp . 2022.05.27 12:42:15 - Above log line repeated 9 times more . 2022.05.27 12:42:15 - Connection terminated. I 2022.05.27 12:42:18 - Checking authorization ... . 2022.05.27 12:42:19 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:42:19 - Elevated: Command:wfp . 2022.05.27 12:42:19 - Elevated: Command:wfp . 2022.05.27 12:42:19 - Elevated: Command:wfp . 2022.05.27 12:42:19 - Above log line repeated 3 times more . 2022.05.27 12:42:19 - IPv6 disabled with packet filtering. ! 2022.05.27 12:42:19 - Connecting to Tejat (Canada, Toronto, Ontario) . 2022.05.27 12:42:19 - Elevated: Command:route-list . 2022.05.27 12:42:20 - Elevated: Command:route . 2022.05.27 12:42:20 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.197/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:42:20 - Routes, add 184.75.221.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:42:20 - Elevated: Command:route-list . 2022.05.27 12:42:20 - Routes, add 184.75.221.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:42:20 - Elevated: Command:wfp . 2022.05.27 12:42:20 - Elevated: Command:wfp . 2022.05.27 12:42:20 - Elevated: Command:wfp . 2022.05.27 12:42:20 - Above log line repeated 3 times more . 2022.05.27 12:42:20 - Elevated: Command:openvpn . 2022.05.27 12:42:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:42:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:42:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:42:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:42:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:42:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:42:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:42:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.197:443 . 2022.05.27 12:42:20 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:42:20 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:42:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.197:443 . 2022.05.27 12:42:21 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.197:443, sid=d9b9db9a 493b8655 . 2022.05.27 12:42:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:42:21 - OpenVPN > VERIFY KU OK . 2022.05.27 12:42:21 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:42:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:42:21 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:42:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.05.27 12:42:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:42:21 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.197:443 . 2022.05.27 12:42:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.122.1,dhcp-option DNS6 fde6:7a:7d20:1b7a::1,tun-ipv6,route-gateway 10.31.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b7a::10d2/64 fde6:7a:7d20:1b7a::1,ifconfig 10.31.122.212 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2022.05.27 12:42:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:42:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.122.1' . 2022.05.27 12:42:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b7a::1' . 2022.05.27 12:42:21 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:42:21 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1b7a::10d2/64 fde6:7a:7d20:1b7a::1' . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:42:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:42:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:42:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:21 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:42:21 - OpenVPN > open_tun . 2022.05.27 12:42:21 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:42:22 - Elevated: Command:wfp . 2022.05.27 12:42:22 - Elevated: Command:wfp . 2022.05.27 12:42:22 - Elevated: Command:wfp . 2022.05.27 12:42:25 - Above log line repeated 3 times more . 2022.05.27 12:42:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.31.122.212 255.255.255.0 . 2022.05.27 12:42:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:42:25 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:42:29 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:42:29 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:42:33 - OpenVPN > NETSH: command failed . 2022.05.27 12:42:33 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:42:33 - Disconnecting . 2022.05.27 12:42:34 - Elevated: Command:route-list . 2022.05.27 12:42:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:34 - Elevated: Command:route-list . 2022.05.27 12:42:34 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:35 - Elevated: Command:route-list . 2022.05.27 12:42:35 - Elevated: Command:route . 2022.05.27 12:42:35 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.197/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:42:35 - Routes, delete 184.75.221.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:42:36 - Elevated: Command:route-list . 2022.05.27 12:42:36 - Routes, delete 184.75.221.195/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:42:36 - Routes, skipped for 2606:6080:1001:15:45d:2b31:f931:2e2 : IPv6 blocked. . 2022.05.27 12:42:36 - Elevated: Command:route-list . 2022.05.27 12:42:36 - Routes, delete 184.75.221.197/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:42:36 - Running event vpn.down . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Above log line repeated 3 times more . 2022.05.27 12:42:37 - IPv6 restored with packet filtering. . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Elevated: Command:wfp . 2022.05.27 12:42:37 - Above log line repeated 9 times more . 2022.05.27 12:42:37 - Connection terminated. I 2022.05.27 12:42:40 - Cancel requested. . 2022.05.27 12:42:40 - Elevated: Command:wintun-adapter-removepool ! 2022.05.27 12:42:40 - Session terminated. I 2022.05.27 12:42:48 - Session starting. I 2022.05.27 12:42:52 - Checking authorization ... . 2022.05.27 12:42:53 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:42:54 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:42:54 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:42:54 - Elevated: Command:wfp . 2022.05.27 12:42:54 - Elevated: Command:wfp . 2022.05.27 12:42:54 - Elevated: Command:wfp . 2022.05.27 12:42:54 - Above log line repeated 3 times more . 2022.05.27 12:42:54 - IPv6 disabled with packet filtering. ! 2022.05.27 12:42:54 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2022.05.27 12:42:55 - Elevated: Command:route-list . 2022.05.27 12:42:55 - Elevated: Command:route . 2022.05.27 12:42:55 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="137.63.71.53/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:42:55 - Routes, add 137.63.71.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:42:55 - Elevated: Command:route-list . 2022.05.27 12:42:55 - Routes, add 137.63.71.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:42:55 - Elevated: Command:wfp . 2022.05.27 12:42:55 - Elevated: Command:wfp . 2022.05.27 12:42:55 - Elevated: Command:wfp . 2022.05.27 12:42:55 - Above log line repeated 3 times more . 2022.05.27 12:42:55 - Elevated: Command:openvpn . 2022.05.27 12:42:56 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:42:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:42:56 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:42:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:42:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:42:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:42:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:42:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.53:443 . 2022.05.27 12:42:56 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:42:56 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:42:56 - OpenVPN > UDP link remote: [AF_INET]137.63.71.53:443 . 2022.05.27 12:42:56 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.53:443, sid=ca18563b fd428fcd . 2022.05.27 12:42:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:42:56 - OpenVPN > VERIFY KU OK . 2022.05.27 12:42:56 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:42:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:42:56 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:42:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2022.05.27 12:42:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:42:56 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.53:443 . 2022.05.27 12:42:56 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:42:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.90.1,dhcp-option DNS6 fde6:7a:7d20:1b5a::1,tun-ipv6,route-gateway 10.31.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b5a::10e2/64 fde6:7a:7d20:1b5a::1,ifconfig 10.31.90.228 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.05.27 12:42:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:42:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.90.1' . 2022.05.27 12:42:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b5a::1' . 2022.05.27 12:42:56 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:42:56 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1b5a::10e2/64 fde6:7a:7d20:1b5a::1' . 2022.05.27 12:42:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:42:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:42:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:42:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:42:57 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:42:57 - OpenVPN > open_tun . 2022.05.27 12:42:57 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:42:57 - Elevated: Command:wfp . 2022.05.27 12:42:57 - Elevated: Command:wfp . 2022.05.27 12:42:57 - Elevated: Command:wfp . 2022.05.27 12:43:01 - Above log line repeated 3 times more . 2022.05.27 12:43:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.31.90.228 255.255.255.0 . 2022.05.27 12:43:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:43:28 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:43:32 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:43:36 - OpenVPN > NETSH: command failed . 2022.05.27 12:43:36 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:43:36 - Disconnecting . 2022.05.27 12:43:36 - Sending soft termination signal . 2022.05.27 12:43:36 - Elevated: Command:openvpn . 2022.05.27 12:43:37 - Elevated: Command:route-list . 2022.05.27 12:43:38 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:43:38 - Elevated: Command:route-list . 2022.05.27 12:43:38 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:43:39 - Elevated: Command:route-list . 2022.05.27 12:43:39 - Elevated: Command:route . 2022.05.27 12:43:43 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="137.63.71.53/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:43:43 - Routes, delete 137.63.71.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:43:43 - Elevated: Command:route-list . 2022.05.27 12:43:43 - Routes, delete 137.63.71.51/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:43:43 - Routes, skipped for 2606:6080:1001:18:8d41:9604:d435:36b6 : IPv6 blocked. . 2022.05.27 12:43:44 - Elevated: Command:route-list . 2022.05.27 12:43:44 - Routes, delete 137.63.71.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:43:44 - Running event vpn.down . 2022.05.27 12:43:45 - Elevated: Command:wfp . 2022.05.27 12:43:45 - Elevated: Command:wfp . 2022.05.27 12:43:45 - Elevated: Command:wfp . 2022.05.27 12:43:45 - Above log line repeated 3 times more . 2022.05.27 12:43:45 - IPv6 restored with packet filtering. . 2022.05.27 12:43:45 - Elevated: Command:wfp . 2022.05.27 12:43:46 - Elevated: Command:wfp . 2022.05.27 12:43:46 - Elevated: Command:wfp . 2022.05.27 12:43:46 - Above log line repeated 9 times more . 2022.05.27 12:43:46 - Connection terminated. I 2022.05.27 12:43:48 - Cancel requested. . 2022.05.27 12:43:48 - Elevated: Command:wintun-adapter-removepool ! 2022.05.27 12:43:49 - Session terminated. I 2022.05.27 12:44:07 - Session starting. I 2022.05.27 12:44:10 - Checking authorization ... . 2022.05.27 12:44:11 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:44:12 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:44:12 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:44:12 - Elevated: Command:wfp . 2022.05.27 12:44:12 - Elevated: Command:wfp . 2022.05.27 12:44:12 - Elevated: Command:wfp . 2022.05.27 12:44:12 - Above log line repeated 3 times more . 2022.05.27 12:44:12 - IPv6 disabled with packet filtering. ! 2022.05.27 12:44:12 - Connecting to Muscida (Netherlands, Alblasserdam) . 2022.05.27 12:44:13 - Elevated: Command:route-list . 2022.05.27 12:44:13 - Elevated: Command:route . 2022.05.27 12:44:13 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="213.152.162.156/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:44:13 - Routes, add 213.152.162.156/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:44:13 - Elevated: Command:route-list . 2022.05.27 12:44:13 - Routes, add 213.152.162.156/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:44:13 - Elevated: Command:wfp . 2022.05.27 12:44:13 - Elevated: Command:wfp . 2022.05.27 12:44:13 - Elevated: Command:wfp . 2022.05.27 12:44:13 - Above log line repeated 3 times more . 2022.05.27 12:44:13 - Elevated: Command:openvpn . 2022.05.27 12:44:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:44:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:44:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:44:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443 . 2022.05.27 12:44:14 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:44:14 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:44:14 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443 . 2022.05.27 12:44:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=c9921324 25d08997 . 2022.05.27 12:44:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:44:14 - OpenVPN > VERIFY KU OK . 2022.05.27 12:44:14 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:44:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:44:14 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:44:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muscida, emailAddress=info@airvpn.org . 2022.05.27 12:44:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:44:14 - OpenVPN > [Muscida] Peer Connection Initiated with [AF_INET]213.152.162.156:443 . 2022.05.27 12:44:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.154.1,dhcp-option DNS6 fde6:7a:7d20:149a::1,tun-ipv6,route-gateway 10.24.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:149a::102f/64 fde6:7a:7d20:149a::1,ifconfig 10.24.154.49 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.05.27 12:44:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:44:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.154.1' . 2022.05.27 12:44:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:149a::1' . 2022.05.27 12:44:14 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:44:14 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:149a::102f/64 fde6:7a:7d20:149a::1' . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:44:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:44:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:44:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:44:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:44:14 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:44:14 - OpenVPN > open_tun . 2022.05.27 12:44:14 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:44:15 - Elevated: Command:wfp . 2022.05.27 12:44:18 - Elevated: Command:wfp . 2022.05.27 12:44:18 - Elevated: Command:wfp . 2022.05.27 12:44:19 - Above log line repeated 3 times more . 2022.05.27 12:44:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.24.154.49 255.255.255.0 . 2022.05.27 12:44:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:44:19 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:44:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:44:23 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:44:27 - OpenVPN > NETSH: command failed . 2022.05.27 12:44:27 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:44:27 - Disconnecting . 2022.05.27 12:44:28 - Elevated: Command:route-list . 2022.05.27 12:44:28 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:28 - Elevated: Command:route-list . 2022.05.27 12:44:28 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:29 - Elevated: Command:route-list . 2022.05.27 12:44:29 - Elevated: Command:route . 2022.05.27 12:44:29 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="213.152.162.156/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:44:29 - Routes, delete 213.152.162.156/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:44:30 - Elevated: Command:route-list . 2022.05.27 12:44:30 - Routes, delete 213.152.162.154/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:30 - Routes, skipped for 2a00:1678:2470:5:3568:e603:2b4d:aeb6 : IPv6 blocked. . 2022.05.27 12:44:30 - Elevated: Command:route-list . 2022.05.27 12:44:30 - Routes, delete 213.152.162.156/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:44:30 - Running event vpn.down . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Above log line repeated 3 times more . 2022.05.27 12:44:31 - IPv6 restored with packet filtering. . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Elevated: Command:wfp . 2022.05.27 12:44:31 - Above log line repeated 9 times more . 2022.05.27 12:44:31 - Connection terminated. I 2022.05.27 12:44:34 - Checking authorization ... . 2022.05.27 12:44:35 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:44:35 - Elevated: Command:wfp . 2022.05.27 12:44:35 - Elevated: Command:wfp . 2022.05.27 12:44:35 - Elevated: Command:wfp . 2022.05.27 12:44:35 - Above log line repeated 3 times more . 2022.05.27 12:44:35 - IPv6 disabled with packet filtering. ! 2022.05.27 12:44:35 - Connecting to Arkab (Canada, Toronto, Ontario) . 2022.05.27 12:44:36 - Elevated: Command:route-list . 2022.05.27 12:44:36 - Elevated: Command:route . 2022.05.27 12:44:36 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.213/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:44:36 - Routes, add 184.75.221.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:44:36 - Elevated: Command:route-list . 2022.05.27 12:44:36 - Routes, add 184.75.221.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:44:36 - Elevated: Command:wfp . 2022.05.27 12:44:36 - Elevated: Command:wfp . 2022.05.27 12:44:36 - Elevated: Command:wfp . 2022.05.27 12:44:36 - Above log line repeated 3 times more . 2022.05.27 12:44:36 - Elevated: Command:openvpn . 2022.05.27 12:44:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:44:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:44:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:44:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443 . 2022.05.27 12:44:37 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:44:37 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:44:37 - OpenVPN > UDP link remote: [AF_INET]184.75.221.213:443 . 2022.05.27 12:44:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=14b0a3e5 7130e5fa . 2022.05.27 12:44:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:44:37 - OpenVPN > VERIFY KU OK . 2022.05.27 12:44:37 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:44:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:44:37 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:44:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org . 2022.05.27 12:44:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:44:37 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.213:443 . 2022.05.27 12:44:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.250.1,dhcp-option DNS6 fde6:7a:7d20:5fa::1,tun-ipv6,route-gateway 10.9.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5fa::10d9/64 fde6:7a:7d20:5fa::1,ifconfig 10.9.250.219 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.05.27 12:44:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:44:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.250.1' . 2022.05.27 12:44:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5fa::1' . 2022.05.27 12:44:37 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:44:37 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:5fa::10d9/64 fde6:7a:7d20:5fa::1' . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:44:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:44:37 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:44:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:44:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:44:37 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:44:37 - OpenVPN > open_tun . 2022.05.27 12:44:37 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:44:38 - Elevated: Command:wfp . 2022.05.27 12:44:41 - Elevated: Command:wfp . 2022.05.27 12:44:41 - Elevated: Command:wfp . 2022.05.27 12:44:41 - Above log line repeated 3 times more . 2022.05.27 12:44:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.9.250.219 255.255.255.0 . 2022.05.27 12:44:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:44:41 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:44:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:44:45 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:44:49 - OpenVPN > NETSH: command failed . 2022.05.27 12:44:49 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:44:49 - Disconnecting . 2022.05.27 12:44:49 - Sending soft termination signal . 2022.05.27 12:44:49 - Elevated: Command:openvpn . 2022.05.27 12:44:49 - Elevated: Command:route-list . 2022.05.27 12:44:49 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:50 - Elevated: Command:route-list . 2022.05.27 12:44:50 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:50 - Elevated: Command:route-list . 2022.05.27 12:44:50 - Elevated: Command:route . 2022.05.27 12:44:51 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.213/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:44:51 - Routes, delete 184.75.221.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:44:51 - Elevated: Command:route-list . 2022.05.27 12:44:51 - Routes, delete 184.75.221.211/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:44:51 - Routes, skipped for 2606:6080:1001:17:9ea4:71f9:d294:d7b7 : IPv6 blocked. . 2022.05.27 12:44:52 - Elevated: Command:route-list . 2022.05.27 12:44:52 - Routes, delete 184.75.221.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:44:52 - Running event vpn.down . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Above log line repeated 3 times more . 2022.05.27 12:44:53 - IPv6 restored with packet filtering. . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Elevated: Command:wfp . 2022.05.27 12:44:53 - Above log line repeated 9 times more . 2022.05.27 12:44:53 - Connection terminated. I 2022.05.27 12:44:56 - Checking authorization ... . 2022.05.27 12:44:58 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:44:58 - Elevated: Command:wfp . 2022.05.27 12:44:58 - Elevated: Command:wfp . 2022.05.27 12:44:58 - Elevated: Command:wfp . 2022.05.27 12:44:58 - Above log line repeated 3 times more . 2022.05.27 12:44:58 - IPv6 disabled with packet filtering. ! 2022.05.27 12:44:58 - Connecting to Gorgonea (Canada, Toronto, Ontario) . 2022.05.27 12:44:58 - Elevated: Command:route-list . 2022.05.27 12:44:58 - Elevated: Command:route . 2022.05.27 12:44:59 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="104.254.90.253/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:44:59 - Routes, add 104.254.90.253/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:44:59 - Elevated: Command:route-list . 2022.05.27 12:44:59 - Routes, add 104.254.90.253/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:44:59 - Elevated: Command:wfp . 2022.05.27 12:44:59 - Elevated: Command:wfp . 2022.05.27 12:44:59 - Elevated: Command:wfp . 2022.05.27 12:44:59 - Above log line repeated 3 times more . 2022.05.27 12:44:59 - Elevated: Command:openvpn . 2022.05.27 12:44:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:44:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:44:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:44:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:44:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:44:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443 . 2022.05.27 12:44:59 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:44:59 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:44:59 - OpenVPN > UDP link remote: [AF_INET]104.254.90.253:443 . 2022.05.27 12:44:59 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=d6379beb e9f7d6e4 . 2022.05.27 12:44:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:44:59 - OpenVPN > VERIFY KU OK . 2022.05.27 12:44:59 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:44:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:44:59 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:44:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gorgonea, emailAddress=info@airvpn.org . 2022.05.27 12:44:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:44:59 - OpenVPN > [Gorgonea] Peer Connection Initiated with [AF_INET]104.254.90.253:443 . 2022.05.27 12:45:01 - OpenVPN > SENT CONTROL [Gorgonea]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:45:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.26.1,dhcp-option DNS6 fde6:7a:7d20:e1a::1,tun-ipv6,route-gateway 10.18.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e1a::1035/64 fde6:7a:7d20:e1a::1,ifconfig 10.18.26.55 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.27 12:45:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:45:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.26.1' . 2022.05.27 12:45:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:e1a::1' . 2022.05.27 12:45:01 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:45:01 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:e1a::1035/64 fde6:7a:7d20:e1a::1' . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:45:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:45:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:45:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:45:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:45:01 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:45:01 - OpenVPN > open_tun . 2022.05.27 12:45:01 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:45:01 - Elevated: Command:wfp . 2022.05.27 12:45:06 - Elevated: Command:wfp . 2022.05.27 12:45:06 - Elevated: Command:wfp . 2022.05.27 12:45:06 - Above log line repeated 3 times more . 2022.05.27 12:45:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.18.26.55 255.255.255.0 . 2022.05.27 12:45:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:45:06 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:45:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:45:06 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:45:10 - OpenVPN > NETSH: command failed . 2022.05.27 12:45:10 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:45:10 - Disconnecting . 2022.05.27 12:45:11 - Elevated: Command:route-list . 2022.05.27 12:45:11 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:12 - Elevated: Command:route-list . 2022.05.27 12:45:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:12 - Elevated: Command:route-list . 2022.05.27 12:45:12 - Elevated: Command:route . 2022.05.27 12:45:13 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="104.254.90.253/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:45:13 - Routes, delete 104.254.90.253/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:45:13 - Elevated: Command:route-list . 2022.05.27 12:45:13 - Routes, delete 104.254.90.251/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:13 - Routes, skipped for 2606:6080:2001:a:9374:410c:ca5:d631 : IPv6 blocked. . 2022.05.27 12:45:13 - Elevated: Command:route-list . 2022.05.27 12:45:13 - Routes, delete 104.254.90.253/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:45:13 - Running event vpn.down . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Above log line repeated 3 times more . 2022.05.27 12:45:14 - IPv6 restored with packet filtering. . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Elevated: Command:wfp . 2022.05.27 12:45:14 - Above log line repeated 9 times more . 2022.05.27 12:45:14 - Connection terminated. I 2022.05.27 12:45:16 - Cancel requested. . 2022.05.27 12:45:16 - Elevated: Command:wintun-adapter-removepool ! 2022.05.27 12:45:17 - Session terminated. I 2022.05.27 12:45:28 - Session starting. I 2022.05.27 12:45:31 - Checking authorization ... . 2022.05.27 12:45:32 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:45:33 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:45:33 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:45:33 - Elevated: Command:wfp . 2022.05.27 12:45:33 - Elevated: Command:wfp . 2022.05.27 12:45:33 - Elevated: Command:wfp . 2022.05.27 12:45:33 - Above log line repeated 3 times more . 2022.05.27 12:45:33 - IPv6 disabled with packet filtering. ! 2022.05.27 12:45:33 - Connecting to Sheliak (Netherlands, Alblasserdam) . 2022.05.27 12:45:33 - Elevated: Command:route-list . 2022.05.27 12:45:34 - Elevated: Command:route . 2022.05.27 12:45:34 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="213.152.186.37/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:45:34 - Routes, add 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:45:34 - Elevated: Command:route-list . 2022.05.27 12:45:34 - Routes, add 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:45:34 - Elevated: Command:wfp . 2022.05.27 12:45:34 - Elevated: Command:wfp . 2022.05.27 12:45:34 - Elevated: Command:wfp . 2022.05.27 12:45:34 - Above log line repeated 3 times more . 2022.05.27 12:45:34 - Elevated: Command:openvpn . 2022.05.27 12:45:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:45:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:45:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:45:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:45:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:45:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:45:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:45:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.37:443 . 2022.05.27 12:45:34 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:45:34 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:45:34 - OpenVPN > UDP link remote: [AF_INET]213.152.186.37:443 . 2022.05.27 12:45:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.37:443, sid=123d6ced 4caa7206 . 2022.05.27 12:45:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:45:35 - OpenVPN > VERIFY KU OK . 2022.05.27 12:45:35 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:45:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:45:35 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:45:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheliak, emailAddress=info@airvpn.org . 2022.05.27 12:45:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:45:35 - OpenVPN > [Sheliak] Peer Connection Initiated with [AF_INET]213.152.186.37:443 . 2022.05.27 12:45:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.58.1,dhcp-option DNS6 fde6:7a:7d20:1a3a::1,tun-ipv6,route-gateway 10.30.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a3a::1017/64 fde6:7a:7d20:1a3a::1,ifconfig 10.30.58.25 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.05.27 12:45:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:45:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.58.1' . 2022.05.27 12:45:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a3a::1' . 2022.05.27 12:45:35 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:45:35 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1a3a::1017/64 fde6:7a:7d20:1a3a::1' . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:45:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:45:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:45:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:45:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:45:35 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:45:35 - OpenVPN > open_tun . 2022.05.27 12:45:35 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:45:35 - Elevated: Command:wfp . 2022.05.27 12:45:36 - Elevated: Command:wfp . 2022.05.27 12:45:36 - Elevated: Command:wfp . 2022.05.27 12:45:36 - Above log line repeated 3 times more . 2022.05.27 12:45:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.30.58.25 255.255.255.0 . 2022.05.27 12:45:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:45:36 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:45:40 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:45:40 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:45:44 - OpenVPN > NETSH: command failed . 2022.05.27 12:45:44 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:45:44 - Disconnecting . 2022.05.27 12:45:45 - Elevated: Command:route-list . 2022.05.27 12:45:45 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:48 - Elevated: Command:route-list . 2022.05.27 12:45:48 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:49 - Elevated: Command:route-list . 2022.05.27 12:45:49 - Elevated: Command:route . 2022.05.27 12:45:49 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="213.152.186.37/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:45:49 - Routes, delete 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:45:49 - Elevated: Command:route-list . 2022.05.27 12:45:49 - Routes, delete 213.152.186.35/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:45:49 - Routes, skipped for 2a00:1678:1337:2330:7adc:2279:d421:9f2f : IPv6 blocked. . 2022.05.27 12:45:50 - Elevated: Command:route-list . 2022.05.27 12:45:50 - Routes, delete 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:45:50 - Running event vpn.down . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Above log line repeated 3 times more . 2022.05.27 12:45:50 - IPv6 restored with packet filtering. . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Elevated: Command:wfp . 2022.05.27 12:45:50 - Above log line repeated 9 times more . 2022.05.27 12:45:50 - Connection terminated. I 2022.05.27 12:45:54 - Checking authorization ... . 2022.05.27 12:45:56 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:45:56 - Elevated: Command:wfp . 2022.05.27 12:45:56 - Elevated: Command:wfp . 2022.05.27 12:45:56 - Elevated: Command:wfp . 2022.05.27 12:45:56 - Above log line repeated 3 times more . 2022.05.27 12:45:56 - IPv6 disabled with packet filtering. ! 2022.05.27 12:45:56 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2022.05.27 12:45:56 - Elevated: Command:route-list . 2022.05.27 12:45:56 - Elevated: Command:route . 2022.05.27 12:45:56 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.205/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:45:56 - Routes, add 184.75.221.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:45:57 - Elevated: Command:route-list . 2022.05.27 12:45:57 - Routes, add 184.75.221.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:45:57 - Elevated: Command:wfp . 2022.05.27 12:45:57 - Elevated: Command:wfp . 2022.05.27 12:45:57 - Elevated: Command:wfp . 2022.05.27 12:45:57 - Above log line repeated 3 times more . 2022.05.27 12:45:57 - Elevated: Command:openvpn . 2022.05.27 12:45:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:45:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:45:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:45:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:45:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:45:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:45:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:45:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2022.05.27 12:45:57 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:45:57 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:45:57 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443 . 2022.05.27 12:45:57 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=6a5b609b 347ec862 . 2022.05.27 12:45:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:45:57 - OpenVPN > VERIFY KU OK . 2022.05.27 12:45:57 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:45:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:45:57 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:45:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2022.05.27 12:45:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:45:57 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 . 2022.05.27 12:45:58 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:46:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.218.1,dhcp-option DNS6 fde6:7a:7d20:2da::1,tun-ipv6,route-gateway 10.6.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1,ifconfig 10.6.218.249 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.27 12:46:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:46:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.218.1' . 2022.05.27 12:46:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2da::1' . 2022.05.27 12:46:01 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:46:01 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1' . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:46:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:46:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:46:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:46:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:46:01 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:46:01 - OpenVPN > open_tun . 2022.05.27 12:46:01 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:46:01 - Elevated: Command:wfp . 2022.05.27 12:46:04 - Elevated: Command:wfp . 2022.05.27 12:46:05 - Elevated: Command:wfp . 2022.05.27 12:46:05 - Above log line repeated 3 times more . 2022.05.27 12:46:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.6.218.249 255.255.255.0 . 2022.05.27 12:46:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:46:05 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:46:08 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:46:08 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:46:12 - OpenVPN > NETSH: command failed . 2022.05.27 12:46:12 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:46:12 - Disconnecting . 2022.05.27 12:46:13 - Elevated: Command:route-list . 2022.05.27 12:46:13 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:46:14 - Elevated: Command:route-list . 2022.05.27 12:46:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:46:14 - Elevated: Command:route-list . 2022.05.27 12:46:15 - Elevated: Command:route . 2022.05.27 12:46:15 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.205/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:46:15 - Routes, delete 184.75.221.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:46:15 - Elevated: Command:route-list . 2022.05.27 12:46:15 - Routes, delete 184.75.221.203/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:46:15 - Routes, skipped for 2606:6080:1001:16:3492:5f11:f1fb:66ae : IPv6 blocked. . 2022.05.27 12:46:16 - Elevated: Command:route-list . 2022.05.27 12:46:16 - Routes, delete 184.75.221.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:46:16 - Running event vpn.down . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:16 - Above log line repeated 3 times more . 2022.05.27 12:46:16 - IPv6 restored with packet filtering. . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:16 - Elevated: Command:wfp . 2022.05.27 12:46:17 - Above log line repeated 9 times more . 2022.05.27 12:46:17 - Connection terminated. I 2022.05.27 12:46:18 - Cancel requested. . 2022.05.27 12:46:18 - Elevated: Command:wintun-adapter-removepool ! 2022.05.27 12:46:18 - Session terminated. I 2022.05.27 12:46:41 - Session starting. I 2022.05.27 12:46:45 - Checking authorization ... . 2022.05.27 12:46:45 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:46:46 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:46:46 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:46:46 - Elevated: Command:wfp . 2022.05.27 12:46:46 - Elevated: Command:wfp . 2022.05.27 12:46:46 - Elevated: Command:wfp . 2022.05.27 12:46:46 - Above log line repeated 3 times more . 2022.05.27 12:46:46 - IPv6 disabled with packet filtering. ! 2022.05.27 12:46:46 - Connecting to Hatysa (Sweden, Uppsala) . 2022.05.27 12:46:47 - Elevated: Command:route-list . 2022.05.27 12:46:47 - Elevated: Command:route . 2022.05.27 12:46:47 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="62.102.148.214/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:46:47 - Routes, add 62.102.148.214/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:46:48 - Elevated: Command:route-list . 2022.05.27 12:46:48 - Routes, add 62.102.148.214/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:46:48 - Elevated: Command:wfp . 2022.05.27 12:46:48 - Elevated: Command:wfp . 2022.05.27 12:46:48 - Elevated: Command:wfp . 2022.05.27 12:46:48 - Above log line repeated 3 times more . 2022.05.27 12:46:48 - Elevated: Command:openvpn . 2022.05.27 12:46:48 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:46:48 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:46:48 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:46:48 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:46:48 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:46:48 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:46:48 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:46:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.214:443 . 2022.05.27 12:46:48 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:46:48 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:46:48 - OpenVPN > UDP link remote: [AF_INET]62.102.148.214:443 . 2022.05.27 12:46:48 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.214:443, sid=50bde87f f80b9aed . 2022.05.27 12:46:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:46:48 - OpenVPN > VERIFY KU OK . 2022.05.27 12:46:48 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:46:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:46:48 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:46:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org . 2022.05.27 12:46:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:46:48 - OpenVPN > [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.214:443 . 2022.05.27 12:46:49 - OpenVPN > SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:46:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.170.1,dhcp-option DNS6 fde6:7a:7d20:eaa::1,tun-ipv6,route-gateway 10.18.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:eaa::10e2/64 fde6:7a:7d20:eaa::1,ifconfig 10.18.170.228 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.05.27 12:46:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:46:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.170.1' . 2022.05.27 12:46:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:eaa::1' . 2022.05.27 12:46:49 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:46:49 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:eaa::10e2/64 fde6:7a:7d20:eaa::1' . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:46:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:46:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:46:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:46:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:46:49 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:46:49 - OpenVPN > open_tun . 2022.05.27 12:46:49 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:46:49 - Elevated: Command:wfp . 2022.05.27 12:46:49 - Elevated: Command:wfp . 2022.05.27 12:46:49 - Elevated: Command:wfp . 2022.05.27 12:46:49 - Above log line repeated 3 times more . 2022.05.27 12:46:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.18.170.228 255.255.255.0 . 2022.05.27 12:46:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:46:50 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:46:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:46:55 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:46:59 - OpenVPN > NETSH: command failed . 2022.05.27 12:46:59 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:46:59 - Disconnecting . 2022.05.27 12:47:00 - Elevated: Command:route-list . 2022.05.27 12:47:00 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:01 - Elevated: Command:route-list . 2022.05.27 12:47:01 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:02 - Elevated: Command:route-list . 2022.05.27 12:47:02 - Elevated: Command:route . 2022.05.27 12:47:02 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="62.102.148.214/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:02 - Routes, delete 62.102.148.214/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:03 - Elevated: Command:route-list . 2022.05.27 12:47:03 - Routes, delete 62.102.148.160/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:03 - Routes, skipped for 2a00:1520:27:1:baf0:b988:6b16:32c6 : IPv6 blocked. . 2022.05.27 12:47:03 - Elevated: Command:route-list . 2022.05.27 12:47:03 - Routes, delete 62.102.148.214/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:47:03 - Running event vpn.down . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Above log line repeated 3 times more . 2022.05.27 12:47:04 - IPv6 restored with packet filtering. . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Elevated: Command:wfp . 2022.05.27 12:47:04 - Above log line repeated 9 times more . 2022.05.27 12:47:04 - Connection terminated. I 2022.05.27 12:47:07 - Checking authorization ... . 2022.05.27 12:47:08 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:47:08 - Elevated: Command:wfp . 2022.05.27 12:47:08 - Elevated: Command:wfp . 2022.05.27 12:47:08 - Elevated: Command:wfp . 2022.05.27 12:47:08 - Above log line repeated 3 times more . 2022.05.27 12:47:08 - IPv6 disabled with packet filtering. ! 2022.05.27 12:47:08 - Connecting to Alya (Canada, Toronto, Ontario) . 2022.05.27 12:47:08 - Elevated: Command:route-list . 2022.05.27 12:47:09 - Elevated: Command:route . 2022.05.27 12:47:09 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.173/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:09 - Routes, add 184.75.221.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:09 - Elevated: Command:route-list . 2022.05.27 12:47:09 - Routes, add 184.75.221.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:47:09 - Elevated: Command:wfp . 2022.05.27 12:47:09 - Elevated: Command:wfp . 2022.05.27 12:47:09 - Elevated: Command:wfp . 2022.05.27 12:47:09 - Above log line repeated 3 times more . 2022.05.27 12:47:09 - Elevated: Command:openvpn . 2022.05.27 12:47:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:47:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:47:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:47:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443 . 2022.05.27 12:47:09 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:47:09 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:47:09 - OpenVPN > UDP link remote: [AF_INET]184.75.221.173:443 . 2022.05.27 12:47:09 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=5e4d5b0a 6e91d11e . 2022.05.27 12:47:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:47:10 - OpenVPN > VERIFY KU OK . 2022.05.27 12:47:10 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:47:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:47:10 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:47:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org . 2022.05.27 12:47:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:47:10 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443 . 2022.05.27 12:47:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.186.1,dhcp-option DNS6 fde6:7a:7d20:4ba::1,tun-ipv6,route-gateway 10.8.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4ba::10e5/64 fde6:7a:7d20:4ba::1,ifconfig 10.8.186.231 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2022.05.27 12:47:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:47:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.186.1' . 2022.05.27 12:47:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4ba::1' . 2022.05.27 12:47:10 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:47:10 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:4ba::10e5/64 fde6:7a:7d20:4ba::1' . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:47:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:47:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:47:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:10 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:47:10 - OpenVPN > open_tun . 2022.05.27 12:47:10 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:47:10 - Elevated: Command:wfp . 2022.05.27 12:47:14 - Elevated: Command:wfp . 2022.05.27 12:47:14 - Elevated: Command:wfp . 2022.05.27 12:47:15 - Above log line repeated 3 times more . 2022.05.27 12:47:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.8.186.231 255.255.255.0 . 2022.05.27 12:47:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:47:15 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:47:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:47:19 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:47:23 - OpenVPN > NETSH: command failed . 2022.05.27 12:47:23 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:47:23 - Disconnecting . 2022.05.27 12:47:24 - Elevated: Command:route-list . 2022.05.27 12:47:24 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:24 - Elevated: Command:route-list . 2022.05.27 12:47:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:25 - Elevated: Command:route-list . 2022.05.27 12:47:25 - Elevated: Command:route . 2022.05.27 12:47:26 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.173/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:26 - Routes, delete 184.75.221.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:26 - Elevated: Command:route-list . 2022.05.27 12:47:26 - Routes, delete 184.75.221.171/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:26 - Routes, skipped for 2606:6080:1001:13:a777:ff73:dfdc:3ab0 : IPv6 blocked. . 2022.05.27 12:47:27 - Elevated: Command:route-list . 2022.05.27 12:47:27 - Routes, delete 184.75.221.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:47:27 - Running event vpn.down . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Above log line repeated 3 times more . 2022.05.27 12:47:28 - IPv6 restored with packet filtering. . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Elevated: Command:wfp . 2022.05.27 12:47:28 - Above log line repeated 9 times more . 2022.05.27 12:47:28 - Connection terminated. I 2022.05.27 12:47:31 - Checking authorization ... . 2022.05.27 12:47:32 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:47:32 - Elevated: Command:wfp . 2022.05.27 12:47:32 - Elevated: Command:wfp . 2022.05.27 12:47:32 - Elevated: Command:wfp . 2022.05.27 12:47:32 - Above log line repeated 3 times more . 2022.05.27 12:47:32 - IPv6 disabled with packet filtering. ! 2022.05.27 12:47:32 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2022.05.27 12:47:32 - Elevated: Command:route-list . 2022.05.27 12:47:33 - Elevated: Command:route . 2022.05.27 12:47:33 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.181/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:33 - Routes, add 184.75.221.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:33 - Elevated: Command:route-list . 2022.05.27 12:47:33 - Routes, add 184.75.221.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:47:33 - Elevated: Command:wfp . 2022.05.27 12:47:33 - Elevated: Command:wfp . 2022.05.27 12:47:33 - Elevated: Command:wfp . 2022.05.27 12:47:33 - Above log line repeated 3 times more . 2022.05.27 12:47:33 - Elevated: Command:openvpn . 2022.05.27 12:47:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:47:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:47:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:47:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.181:443 . 2022.05.27 12:47:33 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:47:33 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:47:33 - OpenVPN > UDP link remote: [AF_INET]184.75.221.181:443 . 2022.05.27 12:47:33 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.181:443, sid=323e51ba feb09879 . 2022.05.27 12:47:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:47:33 - OpenVPN > VERIFY KU OK . 2022.05.27 12:47:33 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:47:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:47:33 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:47:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2022.05.27 12:47:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:47:36 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.181:443 . 2022.05.27 12:47:36 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:47:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.186.1,dhcp-option DNS6 fde6:7a:7d20:18ba::1,tun-ipv6,route-gateway 10.28.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18ba::1019/64 fde6:7a:7d20:18ba::1,ifconfig 10.28.186.27 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.05.27 12:47:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:47:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.186.1' . 2022.05.27 12:47:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18ba::1' . 2022.05.27 12:47:36 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:47:36 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:18ba::1019/64 fde6:7a:7d20:18ba::1' . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:47:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:47:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:47:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:36 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:47:37 - OpenVPN > open_tun . 2022.05.27 12:47:37 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:47:37 - Elevated: Command:wfp . 2022.05.27 12:47:37 - Elevated: Command:wfp . 2022.05.27 12:47:37 - Elevated: Command:wfp . 2022.05.27 12:47:37 - Above log line repeated 3 times more . 2022.05.27 12:47:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.28.186.27 255.255.255.0 . 2022.05.27 12:47:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:47:37 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:47:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:47:42 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:47:46 - OpenVPN > NETSH: command failed . 2022.05.27 12:47:46 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:47:46 - Disconnecting . 2022.05.27 12:47:46 - Elevated: Command:route-list . 2022.05.27 12:47:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:47 - Elevated: Command:route-list . 2022.05.27 12:47:47 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:47 - Elevated: Command:route-list . 2022.05.27 12:47:47 - Elevated: Command:route . 2022.05.27 12:47:48 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.181/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:48 - Routes, delete 184.75.221.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:48 - Elevated: Command:route-list . 2022.05.27 12:47:48 - Routes, delete 184.75.221.179/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:47:48 - Routes, skipped for 2606:6080:1001:14:c766:f45a:ac4d:72a0 : IPv6 blocked. . 2022.05.27 12:47:48 - Elevated: Command:route-list . 2022.05.27 12:47:48 - Routes, delete 184.75.221.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:47:49 - Running event vpn.down . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Above log line repeated 3 times more . 2022.05.27 12:47:49 - IPv6 restored with packet filtering. . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Elevated: Command:wfp . 2022.05.27 12:47:49 - Above log line repeated 9 times more . 2022.05.27 12:47:49 - Connection terminated. I 2022.05.27 12:47:52 - Checking authorization ... . 2022.05.27 12:47:53 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:47:53 - Elevated: Command:wfp . 2022.05.27 12:47:53 - Elevated: Command:wfp . 2022.05.27 12:47:53 - Elevated: Command:wfp . 2022.05.27 12:47:53 - Above log line repeated 3 times more . 2022.05.27 12:47:53 - IPv6 disabled with packet filtering. ! 2022.05.27 12:47:53 - Connecting to Cephei (Canada, Toronto, Ontario) . 2022.05.27 12:47:54 - Elevated: Command:route-list . 2022.05.27 12:47:54 - Elevated: Command:route . 2022.05.27 12:47:54 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.214.165/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:47:54 - Routes, add 184.75.214.165/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:47:54 - Elevated: Command:route-list . 2022.05.27 12:47:54 - Routes, add 184.75.214.165/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:47:54 - Elevated: Command:wfp . 2022.05.27 12:47:54 - Elevated: Command:wfp . 2022.05.27 12:47:54 - Elevated: Command:wfp . 2022.05.27 12:47:54 - Above log line repeated 3 times more . 2022.05.27 12:47:54 - Elevated: Command:openvpn . 2022.05.27 12:47:54 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:47:54 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:47:54 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:47:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:47:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:47:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2022.05.27 12:47:54 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:47:55 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:47:55 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2022.05.27 12:47:55 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=9b5a414e ea39e2cc . 2022.05.27 12:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:47:55 - OpenVPN > VERIFY KU OK . 2022.05.27 12:47:55 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:47:55 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2022.05.27 12:47:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:47:55 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 . 2022.05.27 12:47:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.122.1,dhcp-option DNS6 fde6:7a:7d20:97a::1,tun-ipv6,route-gateway 10.13.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:97a::1031/64 fde6:7a:7d20:97a::1,ifconfig 10.13.122.51 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.05.27 12:47:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:47:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.122.1' . 2022.05.27 12:47:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:97a::1' . 2022.05.27 12:47:55 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:47:55 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:97a::1031/64 fde6:7a:7d20:97a::1' . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:47:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:47:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:47:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:47:55 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:47:55 - OpenVPN > open_tun . 2022.05.27 12:47:55 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:47:56 - Elevated: Command:wfp . 2022.05.27 12:47:59 - Elevated: Command:wfp . 2022.05.27 12:47:59 - Elevated: Command:wfp . 2022.05.27 12:47:59 - Above log line repeated 3 times more . 2022.05.27 12:47:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.13.122.51 255.255.255.0 . 2022.05.27 12:48:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:00 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:02 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:06 - OpenVPN > NETSH: command failed . 2022.05.27 12:48:06 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:48:06 - Disconnecting . 2022.05.27 12:48:06 - Sending soft termination signal . 2022.05.27 12:48:06 - Elevated: Command:openvpn . 2022.05.27 12:48:07 - Elevated: Command:route-list . 2022.05.27 12:48:07 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:07 - Elevated: Command:route-list . 2022.05.27 12:48:07 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:08 - Elevated: Command:route-list . 2022.05.27 12:48:08 - Elevated: Command:route . 2022.05.27 12:48:08 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.214.165/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:48:08 - Routes, delete 184.75.214.165/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:48:09 - Elevated: Command:route-list . 2022.05.27 12:48:09 - Routes, delete 184.75.214.163/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:09 - Routes, skipped for 2606:6080:1001:c:1d9a:8f36:e174:d7c5 : IPv6 blocked. . 2022.05.27 12:48:09 - Elevated: Command:route-list . 2022.05.27 12:48:09 - Routes, delete 184.75.214.165/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:48:09 - Running event vpn.down . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Above log line repeated 3 times more . 2022.05.27 12:48:10 - IPv6 restored with packet filtering. . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Elevated: Command:wfp . 2022.05.27 12:48:10 - Above log line repeated 9 times more . 2022.05.27 12:48:10 - Connection terminated. I 2022.05.27 12:48:13 - Checking authorization ... . 2022.05.27 12:48:14 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:48:14 - Elevated: Command:wfp . 2022.05.27 12:48:14 - Elevated: Command:wfp . 2022.05.27 12:48:14 - Elevated: Command:wfp . 2022.05.27 12:48:14 - Above log line repeated 3 times more . 2022.05.27 12:48:14 - IPv6 disabled with packet filtering. ! 2022.05.27 12:48:14 - Connecting to Telescopium (Canada, Vancouver) . 2022.05.27 12:48:14 - Elevated: Command:route-list . 2022.05.27 12:48:15 - Elevated: Command:route . 2022.05.27 12:48:15 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.30.89.53/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:48:15 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:48:15 - Elevated: Command:route-list . 2022.05.27 12:48:15 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:48:15 - Elevated: Command:wfp . 2022.05.27 12:48:15 - Elevated: Command:wfp . 2022.05.27 12:48:15 - Elevated: Command:wfp . 2022.05.27 12:48:15 - Above log line repeated 3 times more . 2022.05.27 12:48:15 - Elevated: Command:openvpn . 2022.05.27 12:48:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:48:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:48:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:48:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:48:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:48:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:48:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:48:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2022.05.27 12:48:15 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:48:15 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:48:16 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2022.05.27 12:48:16 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=a8c07db2 cafb3910 . 2022.05.27 12:48:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:48:16 - OpenVPN > VERIFY KU OK . 2022.05.27 12:48:16 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:48:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:48:16 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:48:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2022.05.27 12:48:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:48:16 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2022.05.27 12:48:16 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:48:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.10.1,dhcp-option DNS6 fde6:7a:7d20:f0a::1,tun-ipv6,route-gateway 10.19.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0a::102c/64 fde6:7a:7d20:f0a::1,ifconfig 10.19.10.46 255.255.255.0,peer-id 12,cipher AES-256-GCM' . 2022.05.27 12:48:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:48:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.10.1' . 2022.05.27 12:48:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0a::1' . 2022.05.27 12:48:16 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:48:16 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:f0a::102c/64 fde6:7a:7d20:f0a::1' . 2022.05.27 12:48:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:48:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:48:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:48:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:48:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:48:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:48:17 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:48:17 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:48:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:48:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:48:17 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:48:17 - OpenVPN > open_tun . 2022.05.27 12:48:17 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:48:17 - Elevated: Command:wfp . 2022.05.27 12:48:19 - Elevated: Command:wfp . 2022.05.27 12:48:20 - Elevated: Command:wfp . 2022.05.27 12:48:20 - Above log line repeated 3 times more . 2022.05.27 12:48:20 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.19.10.46 255.255.255.0 . 2022.05.27 12:48:20 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:20 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:23 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:27 - OpenVPN > NETSH: command failed . 2022.05.27 12:48:27 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:48:27 - Disconnecting . 2022.05.27 12:48:28 - Elevated: Command:route-list . 2022.05.27 12:48:28 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:29 - Elevated: Command:route-list . 2022.05.27 12:48:29 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:29 - Elevated: Command:route-list . 2022.05.27 12:48:29 - Elevated: Command:route . 2022.05.27 12:48:29 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.30.89.53/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:48:29 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:48:30 - Elevated: Command:route-list . 2022.05.27 12:48:30 - Routes, delete 192.30.89.51/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:30 - Routes, skipped for 2606:9580:100:c:8757:8ee:ec9c:991c : IPv6 blocked. . 2022.05.27 12:48:30 - Elevated: Command:route-list . 2022.05.27 12:48:30 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:48:30 - Running event vpn.down . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Above log line repeated 3 times more . 2022.05.27 12:48:31 - IPv6 restored with packet filtering. . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Elevated: Command:wfp . 2022.05.27 12:48:31 - Above log line repeated 9 times more . 2022.05.27 12:48:31 - Connection terminated. I 2022.05.27 12:48:34 - Checking authorization ... . 2022.05.27 12:48:35 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:48:35 - Elevated: Command:wfp . 2022.05.27 12:48:35 - Elevated: Command:wfp . 2022.05.27 12:48:35 - Elevated: Command:wfp . 2022.05.27 12:48:35 - Above log line repeated 3 times more . 2022.05.27 12:48:35 - IPv6 disabled with packet filtering. ! 2022.05.27 12:48:35 - Connecting to Chort (Canada, Toronto, Ontario) . 2022.05.27 12:48:36 - Elevated: Command:route-list . 2022.05.27 12:48:36 - Elevated: Command:route . 2022.05.27 12:48:36 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="104.254.90.237/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:48:36 - Routes, add 104.254.90.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:48:36 - Elevated: Command:route-list . 2022.05.27 12:48:36 - Routes, add 104.254.90.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:48:36 - Elevated: Command:wfp . 2022.05.27 12:48:36 - Elevated: Command:wfp . 2022.05.27 12:48:36 - Elevated: Command:wfp . 2022.05.27 12:48:36 - Above log line repeated 3 times more . 2022.05.27 12:48:36 - Elevated: Command:openvpn . 2022.05.27 12:48:36 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:48:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:48:36 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:48:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:48:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:48:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:48:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:48:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2022.05.27 12:48:36 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:48:36 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:48:36 - OpenVPN > UDP link remote: [AF_INET]104.254.90.237:443 . 2022.05.27 12:48:37 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=51a94340 7fb4d346 . 2022.05.27 12:48:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:48:37 - OpenVPN > VERIFY KU OK . 2022.05.27 12:48:37 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:48:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:48:37 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:48:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2022.05.27 12:48:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:48:39 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443 . 2022.05.27 12:48:39 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:48:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.58.1,dhcp-option DNS6 fde6:7a:7d20:a3a::1,tun-ipv6,route-gateway 10.14.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a3a::1007/64 fde6:7a:7d20:a3a::1,ifconfig 10.14.58.9 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.05.27 12:48:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:48:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.58.1' . 2022.05.27 12:48:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a3a::1' . 2022.05.27 12:48:39 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:48:39 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:a3a::1007/64 fde6:7a:7d20:a3a::1' . 2022.05.27 12:48:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:48:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:48:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:48:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:48:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:48:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:48:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:48:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:48:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:48:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:48:40 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:48:40 - OpenVPN > open_tun . 2022.05.27 12:48:40 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:48:40 - Elevated: Command:wfp . 2022.05.27 12:48:44 - Elevated: Command:wfp . 2022.05.27 12:48:44 - Elevated: Command:wfp . 2022.05.27 12:48:44 - Above log line repeated 3 times more . 2022.05.27 12:48:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.14.58.9 255.255.255.0 . 2022.05.27 12:48:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:44 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:48:45 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:48:49 - OpenVPN > NETSH: command failed . 2022.05.27 12:48:49 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:48:49 - Disconnecting . 2022.05.27 12:48:50 - Elevated: Command:route-list . 2022.05.27 12:48:50 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:51 - Elevated: Command:route-list . 2022.05.27 12:48:51 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:51 - Elevated: Command:route-list . 2022.05.27 12:48:51 - Elevated: Command:route . 2022.05.27 12:48:52 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="104.254.90.237/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:48:52 - Routes, delete 104.254.90.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:48:52 - Elevated: Command:route-list . 2022.05.27 12:48:52 - Routes, delete 104.254.90.235/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:48:52 - Routes, skipped for 2606:6080:2001:8:df6a:e365:26ff:7f06 : IPv6 blocked. . 2022.05.27 12:48:52 - Elevated: Command:route-list . 2022.05.27 12:48:53 - Routes, delete 104.254.90.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:48:53 - Running event vpn.down . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Above log line repeated 3 times more . 2022.05.27 12:48:55 - IPv6 restored with packet filtering. . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Elevated: Command:wfp . 2022.05.27 12:48:55 - Above log line repeated 9 times more . 2022.05.27 12:48:55 - Connection terminated. I 2022.05.27 12:48:56 - Cancel requested. . 2022.05.27 12:48:56 - Elevated: Command:wintun-adapter-removepool ! 2022.05.27 12:48:56 - Session terminated. ! 2022.05.27 12:48:59 - Deactivation of Network Lock . 2022.05.27 12:48:59 - Elevated: Command:wfp . 2022.05.27 12:48:59 - Elevated: Command:wfp . 2022.05.27 12:48:59 - Elevated: Command:wfp . 2022.05.27 12:49:01 - Above log line repeated 49 times more ! 2022.05.27 12:49:01 - Logged out. . 2022.05.27 12:55:43 - Elevated: Command:service-conn-mode I 2022.05.27 12:56:01 - Checking login ... ! 2022.05.27 12:56:01 - Logged in. ! 2022.05.27 12:56:05 - Activation of Network Lock - Windows Filtering Platform . 2022.05.27 12:56:06 - Elevated: Command:wfp . 2022.05.27 12:56:06 - Elevated: Command:wfp . 2022.05.27 12:56:06 - Elevated: Command:wfp . 2022.05.27 12:56:20 - Above log line repeated 49 times more I 2022.05.27 12:56:20 - Session starting. I 2022.05.27 12:56:23 - Checking authorization ... . 2022.05.27 12:56:24 - Elevated: Command:wintun-adapter-ensure . 2022.05.27 12:56:25 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.27 12:56:25 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:56:25 - Elevated: Command:wfp . 2022.05.27 12:56:25 - Elevated: Command:wfp . 2022.05.27 12:56:25 - Elevated: Command:wfp . 2022.05.27 12:56:25 - Above log line repeated 3 times more . 2022.05.27 12:56:25 - IPv6 disabled with packet filtering. ! 2022.05.27 12:56:25 - Connecting to Nahn (Canada, Vancouver) . 2022.05.27 12:56:26 - Elevated: Command:route-list . 2022.05.27 12:56:26 - Elevated: Command:route . 2022.05.27 12:56:26 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.30.89.69/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:56:26 - Routes, add 192.30.89.69/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:56:26 - Elevated: Command:route-list . 2022.05.27 12:56:26 - Routes, add 192.30.89.69/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:56:26 - Elevated: Command:wfp . 2022.05.27 12:56:26 - Elevated: Command:wfp . 2022.05.27 12:56:26 - Elevated: Command:wfp . 2022.05.27 12:56:26 - Above log line repeated 3 times more . 2022.05.27 12:56:26 - Elevated: Command:openvpn . 2022.05.27 12:56:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:56:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:56:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:56:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:56:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:56:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:56:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:56:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443 . 2022.05.27 12:56:27 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:56:27 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:56:27 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443 . 2022.05.27 12:56:27 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=7d3708d6 889974c0 . 2022.05.27 12:56:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:56:27 - OpenVPN > VERIFY KU OK . 2022.05.27 12:56:27 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:56:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:56:27 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:56:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2022.05.27 12:56:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:56:27 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443 . 2022.05.27 12:56:27 - OpenVPN > SENT CONTROL [Nahn]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:56:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.74.1,dhcp-option DNS6 fde6:7a:7d20:1f4a::1,tun-ipv6,route-gateway 10.35.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f4a::107c/64 fde6:7a:7d20:1f4a::1,ifconfig 10.35.74.126 255.255.255.0,peer-id 18,cipher AES-256-GCM' . 2022.05.27 12:56:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:56:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.74.1' . 2022.05.27 12:56:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f4a::1' . 2022.05.27 12:56:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:56:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1f4a::107c/64 fde6:7a:7d20:1f4a::1' . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:56:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:56:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:56:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:56:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:56:28 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:56:28 - OpenVPN > open_tun . 2022.05.27 12:56:28 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:56:29 - Elevated: Command:wfp . 2022.05.27 12:56:31 - Elevated: Command:wfp . 2022.05.27 12:56:31 - Elevated: Command:wfp . 2022.05.27 12:56:31 - Above log line repeated 3 times more . 2022.05.27 12:56:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.35.74.126 255.255.255.0 . 2022.05.27 12:56:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:56:31 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:56:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:56:35 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:56:39 - OpenVPN > NETSH: command failed . 2022.05.27 12:56:39 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:56:39 - Disconnecting . 2022.05.27 12:56:40 - Elevated: Command:route-list . 2022.05.27 12:56:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:56:40 - Elevated: Command:route-list . 2022.05.27 12:56:40 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:56:40 - Elevated: Command:route-list . 2022.05.27 12:56:41 - Elevated: Command:route . 2022.05.27 12:56:41 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.30.89.69/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:56:41 - Routes, delete 192.30.89.69/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:56:42 - Elevated: Command:route-list . 2022.05.27 12:56:42 - Routes, delete 192.30.89.67/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:56:42 - Routes, skipped for 2606:9580:100:e:d075:a67e:1f9c:139d : IPv6 blocked. . 2022.05.27 12:56:43 - Elevated: Command:route-list . 2022.05.27 12:56:43 - Routes, delete 192.30.89.69/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:56:43 - Running event vpn.down . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:43 - Above log line repeated 3 times more . 2022.05.27 12:56:43 - IPv6 restored with packet filtering. . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:43 - Elevated: Command:wfp . 2022.05.27 12:56:44 - Above log line repeated 9 times more . 2022.05.27 12:56:44 - Connection terminated. I 2022.05.27 12:56:47 - Checking authorization ... . 2022.05.27 12:56:48 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 12:56:48 - Elevated: Command:wfp . 2022.05.27 12:56:48 - Elevated: Command:wfp . 2022.05.27 12:56:48 - Elevated: Command:wfp . 2022.05.27 12:56:48 - Above log line repeated 3 times more . 2022.05.27 12:56:48 - IPv6 disabled with packet filtering. ! 2022.05.27 12:56:48 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2022.05.27 12:56:48 - Elevated: Command:route-list . 2022.05.27 12:56:48 - Elevated: Command:route . 2022.05.27 12:56:48 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.221.61/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 12:56:48 - Routes, add 184.75.221.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:56:49 - Elevated: Command:route-list . 2022.05.27 12:56:49 - Routes, add 184.75.221.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 12:56:49 - Elevated: Command:wfp . 2022.05.27 12:56:49 - Elevated: Command:wfp . 2022.05.27 12:56:49 - Elevated: Command:wfp . 2022.05.27 12:56:49 - Above log line repeated 3 times more . 2022.05.27 12:56:49 - Elevated: Command:openvpn . 2022.05.27 12:56:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 12:56:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 12:56:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 12:56:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:56:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:56:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 12:56:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 12:56:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443 . 2022.05.27 12:56:49 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 12:56:49 - OpenVPN > UDP link local: (not bound) . 2022.05.27 12:56:49 - OpenVPN > UDP link remote: [AF_INET]184.75.221.61:443 . 2022.05.27 12:56:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=c794be65 e2b6b583 . 2022.05.27 12:56:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 12:56:49 - OpenVPN > VERIFY KU OK . 2022.05.27 12:56:49 - OpenVPN > Validating certificate extended key usage . 2022.05.27 12:56:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 12:56:49 - OpenVPN > VERIFY EKU OK . 2022.05.27 12:56:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ukdah, emailAddress=info@airvpn.org . 2022.05.27 12:56:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 12:56:49 - OpenVPN > [Ukdah] Peer Connection Initiated with [AF_INET]184.75.221.61:443 . 2022.05.27 12:56:50 - OpenVPN > SENT CONTROL [Ukdah]: 'PUSH_REQUEST' (status=1) . 2022.05.27 12:56:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.250.1,dhcp-option DNS6 fde6:7a:7d20:1bfa::1,tun-ipv6,route-gateway 10.31.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bfa::105c/64 fde6:7a:7d20:1bfa::1,ifconfig 10.31.250.94 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2022.05.27 12:56:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 12:56:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.250.1' . 2022.05.27 12:56:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bfa::1' . 2022.05.27 12:56:50 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 12:56:50 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1bfa::105c/64 fde6:7a:7d20:1bfa::1' . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 12:56:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 12:56:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 12:56:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:56:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 12:56:50 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 12:56:50 - OpenVPN > open_tun . 2022.05.27 12:56:50 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 12:56:50 - Elevated: Command:wfp . 2022.05.27 12:56:53 - Elevated: Command:wfp . 2022.05.27 12:56:53 - Elevated: Command:wfp . 2022.05.27 12:56:54 - Above log line repeated 3 times more . 2022.05.27 12:56:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.31.250.94 255.255.255.0 . 2022.05.27 12:56:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:56:54 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:56:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 12:56:58 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 12:57:02 - OpenVPN > NETSH: command failed . 2022.05.27 12:57:02 - OpenVPN > Exiting due to fatal error ! 2022.05.27 12:57:02 - Disconnecting . 2022.05.27 12:57:02 - Sending soft termination signal . 2022.05.27 12:57:02 - Elevated: Command:openvpn . 2022.05.27 12:57:02 - Elevated: Command:route-list . 2022.05.27 12:57:02 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:57:03 - Elevated: Command:route-list . 2022.05.27 12:57:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:57:03 - Elevated: Command:route-list . 2022.05.27 12:57:03 - Elevated: Command:route . 2022.05.27 12:57:04 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.221.61/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 12:57:04 - Routes, delete 184.75.221.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 12:57:05 - Elevated: Command:route-list . 2022.05.27 12:57:05 - Routes, delete 184.75.221.59/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 12:57:05 - Routes, skipped for 2606:6080:1001:10:3c5b:63ff:df18:8486 : IPv6 blocked. . 2022.05.27 12:57:05 - Elevated: Command:route-list . 2022.05.27 12:57:05 - Routes, delete 184.75.221.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 12:57:05 - Running event vpn.down . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Above log line repeated 3 times more . 2022.05.27 12:57:07 - IPv6 restored with packet filtering. . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Elevated: Command:wfp . 2022.05.27 12:57:07 - Above log line repeated 9 times more . 2022.05.27 12:57:07 - Connection terminated. I 2022.05.27 12:57:09 - Cancel requested. ! 2022.05.27 12:57:09 - Session terminated. ! 2022.05.27 12:57:18 - Deactivation of Network Lock . 2022.05.27 12:57:18 - Elevated: Command:wfp . 2022.05.27 12:57:18 - Elevated: Command:wfp . 2022.05.27 12:57:18 - Elevated: Command:wfp . 2022.05.27 13:01:22 - Above log line repeated 49 times more . 2022.05.27 13:01:22 - Elevated: Command:service-conn-mode ! 2022.05.27 13:01:28 - Activation of Network Lock - Windows Filtering Platform . 2022.05.27 13:01:29 - Elevated: Command:wfp . 2022.05.27 13:01:29 - Elevated: Command:wfp . 2022.05.27 13:01:29 - Elevated: Command:wfp . 2022.05.27 13:01:38 - Above log line repeated 49 times more I 2022.05.27 13:01:38 - Session starting. I 2022.05.27 13:01:41 - Checking authorization ... . 2022.05.27 13:01:42 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 13:01:42 - Elevated: Command:wfp . 2022.05.27 13:01:42 - Elevated: Command:wfp . 2022.05.27 13:01:42 - Elevated: Command:wfp . 2022.05.27 13:01:42 - Above log line repeated 3 times more . 2022.05.27 13:01:42 - IPv6 disabled with packet filtering. ! 2022.05.27 13:01:42 - Connecting to Agena (Canada, Toronto, Ontario) . 2022.05.27 13:01:42 - Elevated: Command:route-list . 2022.05.27 13:01:43 - Elevated: Command:route . 2022.05.27 13:01:43 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.223.213/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 13:01:43 - Routes, add 184.75.223.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:01:43 - Elevated: Command:route-list . 2022.05.27 13:01:43 - Routes, add 184.75.223.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 13:01:43 - Elevated: Command:wfp . 2022.05.27 13:01:43 - Elevated: Command:wfp . 2022.05.27 13:01:43 - Elevated: Command:wfp . 2022.05.27 13:01:43 - Above log line repeated 3 times more . 2022.05.27 13:01:43 - Elevated: Command:openvpn . 2022.05.27 13:01:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 13:01:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 13:01:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 13:01:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:01:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:01:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:01:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:01:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2022.05.27 13:01:43 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 13:01:43 - OpenVPN > UDP link local: (not bound) . 2022.05.27 13:01:43 - OpenVPN > UDP link remote: [AF_INET]184.75.223.213:443 . 2022.05.27 13:01:43 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=fceb39fe f189de7b . 2022.05.27 13:01:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 13:01:44 - OpenVPN > VERIFY KU OK . 2022.05.27 13:01:44 - OpenVPN > Validating certificate extended key usage . 2022.05.27 13:01:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 13:01:44 - OpenVPN > VERIFY EKU OK . 2022.05.27 13:01:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org . 2022.05.27 13:01:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 13:01:44 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 . 2022.05.27 13:01:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.218.1,dhcp-option DNS6 fde6:7a:7d20:da::1,tun-ipv6,route-gateway 10.4.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:da::10dd/64 fde6:7a:7d20:da::1,ifconfig 10.4.218.223 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2022.05.27 13:01:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 13:01:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.218.1' . 2022.05.27 13:01:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:da::1' . 2022.05.27 13:01:44 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 13:01:44 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:da::10dd/64 fde6:7a:7d20:da::1' . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 13:01:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 13:01:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 13:01:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:01:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:01:44 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 13:01:44 - OpenVPN > open_tun . 2022.05.27 13:01:45 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 13:01:45 - Elevated: Command:wfp . 2022.05.27 13:01:49 - Elevated: Command:wfp . 2022.05.27 13:01:49 - Elevated: Command:wfp . 2022.05.27 13:01:49 - Above log line repeated 3 times more . 2022.05.27 13:01:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.4.218.223 255.255.255.0 . 2022.05.27 13:01:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:01:49 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:01:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:01:53 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:01:57 - OpenVPN > NETSH: command failed . 2022.05.27 13:01:57 - OpenVPN > Exiting due to fatal error ! 2022.05.27 13:01:57 - Disconnecting . 2022.05.27 13:01:57 - Elevated: Command:route-list . 2022.05.27 13:01:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:01:58 - Elevated: Command:route-list . 2022.05.27 13:01:58 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:01:58 - Elevated: Command:route-list . 2022.05.27 13:01:59 - Elevated: Command:route . 2022.05.27 13:01:59 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.223.213/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 13:01:59 - Routes, delete 184.75.223.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:02:00 - Elevated: Command:route-list . 2022.05.27 13:02:00 - Routes, delete 184.75.223.211/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:00 - Routes, skipped for 2606:6080:1002:6:f780:efa6:f9d2:3459 : IPv6 blocked. . 2022.05.27 13:02:00 - Elevated: Command:route-list . 2022.05.27 13:02:00 - Routes, delete 184.75.223.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 13:02:00 - Running event vpn.down . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Above log line repeated 3 times more . 2022.05.27 13:02:01 - IPv6 restored with packet filtering. . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Elevated: Command:wfp . 2022.05.27 13:02:01 - Above log line repeated 9 times more . 2022.05.27 13:02:01 - Connection terminated. I 2022.05.27 13:02:04 - Checking authorization ... . 2022.05.27 13:02:05 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 13:02:05 - Elevated: Command:wfp . 2022.05.27 13:02:05 - Elevated: Command:wfp . 2022.05.27 13:02:05 - Elevated: Command:wfp . 2022.05.27 13:02:05 - Above log line repeated 3 times more . 2022.05.27 13:02:05 - IPv6 disabled with packet filtering. ! 2022.05.27 13:02:05 - Connecting to Avior (Canada, Toronto, Ontario) . 2022.05.27 13:02:05 - Elevated: Command:route-list . 2022.05.27 13:02:06 - Elevated: Command:route . 2022.05.27 13:02:06 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="184.75.223.237/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 13:02:06 - Routes, add 184.75.223.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:02:06 - Elevated: Command:route-list . 2022.05.27 13:02:06 - Routes, add 184.75.223.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 13:02:06 - Elevated: Command:wfp . 2022.05.27 13:02:06 - Elevated: Command:wfp . 2022.05.27 13:02:06 - Elevated: Command:wfp . 2022.05.27 13:02:06 - Above log line repeated 3 times more . 2022.05.27 13:02:06 - Elevated: Command:openvpn . 2022.05.27 13:02:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 13:02:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 13:02:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 13:02:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:02:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:02:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:02:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:02:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2022.05.27 13:02:06 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 13:02:06 - OpenVPN > UDP link local: (not bound) . 2022.05.27 13:02:06 - OpenVPN > UDP link remote: [AF_INET]184.75.223.237:443 . 2022.05.27 13:02:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=575079e5 22600f1e . 2022.05.27 13:02:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 13:02:06 - OpenVPN > VERIFY KU OK . 2022.05.27 13:02:06 - OpenVPN > Validating certificate extended key usage . 2022.05.27 13:02:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 13:02:06 - OpenVPN > VERIFY EKU OK . 2022.05.27 13:02:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org . 2022.05.27 13:02:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 13:02:07 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 . 2022.05.27 13:02:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.250.1,dhcp-option DNS6 fde6:7a:7d20:6fa::1,tun-ipv6,route-gateway 10.10.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6fa::107c/64 fde6:7a:7d20:6fa::1,ifconfig 10.10.250.126 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.27 13:02:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 13:02:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.250.1' . 2022.05.27 13:02:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6fa::1' . 2022.05.27 13:02:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 13:02:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:6fa::107c/64 fde6:7a:7d20:6fa::1' . 2022.05.27 13:02:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 13:02:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 13:02:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 13:02:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:02:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:02:08 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 13:02:08 - OpenVPN > open_tun . 2022.05.27 13:02:08 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 13:02:09 - Elevated: Command:wfp . 2022.05.27 13:02:10 - Elevated: Command:wfp . 2022.05.27 13:02:11 - Elevated: Command:wfp . 2022.05.27 13:02:11 - Above log line repeated 3 times more . 2022.05.27 13:02:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.10.250.126 255.255.255.0 . 2022.05.27 13:02:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:02:11 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:02:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:02:13 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:02:17 - OpenVPN > NETSH: command failed . 2022.05.27 13:02:17 - OpenVPN > Exiting due to fatal error ! 2022.05.27 13:02:17 - Disconnecting . 2022.05.27 13:02:18 - Elevated: Command:route-list . 2022.05.27 13:02:18 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:19 - Elevated: Command:route-list . 2022.05.27 13:02:19 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:20 - Elevated: Command:route-list . 2022.05.27 13:02:21 - Elevated: Command:route . 2022.05.27 13:02:21 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="184.75.223.237/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 13:02:21 - Routes, delete 184.75.223.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:02:21 - Elevated: Command:route-list . 2022.05.27 13:02:21 - Routes, delete 184.75.223.235/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:21 - Routes, skipped for 2606:6080:1002:9:ffc4:b9c1:20ad:82f9 : IPv6 blocked. . 2022.05.27 13:02:22 - Elevated: Command:route-list . 2022.05.27 13:02:22 - Routes, delete 184.75.223.237/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 13:02:22 - Running event vpn.down . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Above log line repeated 3 times more . 2022.05.27 13:02:22 - IPv6 restored with packet filtering. . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Elevated: Command:wfp . 2022.05.27 13:02:22 - Above log line repeated 9 times more . 2022.05.27 13:02:22 - Connection terminated. I 2022.05.27 13:02:26 - Checking authorization ... . 2022.05.27 13:02:26 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.05.27 13:02:26 - Elevated: Command:wfp . 2022.05.27 13:02:26 - Elevated: Command:wfp . 2022.05.27 13:02:26 - Elevated: Command:wfp . 2022.05.27 13:02:26 - Above log line repeated 3 times more . 2022.05.27 13:02:26 - IPv6 disabled with packet filtering. ! 2022.05.27 13:02:26 - Connecting to Enif (Canada, Toronto, Ontario) . 2022.05.27 13:02:27 - Elevated: Command:route-list . 2022.05.27 13:02:27 - Elevated: Command:route . 2022.05.27 13:02:27 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 add route prefix="104.254.90.245/32" interface="3" nexthop="192.168.0.1" metric=0 store=active', exit:0, out:'Ok.' . 2022.05.27 13:02:27 - Routes, add 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:02:28 - Elevated: Command:route-list . 2022.05.27 13:02:28 - Routes, add 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2022.05.27 13:02:28 - Elevated: Command:wfp . 2022.05.27 13:02:28 - Elevated: Command:wfp . 2022.05.27 13:02:28 - Elevated: Command:wfp . 2022.05.27 13:02:28 - Above log line repeated 3 times more . 2022.05.27 13:02:28 - Elevated: Command:openvpn . 2022.05.27 13:02:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 13:02:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 13:02:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 13:02:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:02:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:02:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.27 13:02:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.27 13:02:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2022.05.27 13:02:28 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288] . 2022.05.27 13:02:28 - OpenVPN > UDP link local: (not bound) . 2022.05.27 13:02:28 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2022.05.27 13:02:28 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=1de3d3c9 52085d7a . 2022.05.27 13:02:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.27 13:02:28 - OpenVPN > VERIFY KU OK . 2022.05.27 13:02:28 - OpenVPN > Validating certificate extended key usage . 2022.05.27 13:02:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.27 13:02:28 - OpenVPN > VERIFY EKU OK . 2022.05.27 13:02:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2022.05.27 13:02:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.27 13:02:30 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2022.05.27 13:02:31 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1) . 2022.05.27 13:02:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.90.1,dhcp-option DNS6 fde6:7a:7d20:c5a::1,tun-ipv6,route-gateway 10.16.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c5a::10a3/64 fde6:7a:7d20:c5a::1,ifconfig 10.16.90.165 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.05.27 13:02:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.27 13:02:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.90.1' . 2022.05.27 13:02:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c5a::1' . 2022.05.27 13:02:31 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.05.27 13:02:31 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:c5a::10a3/64 fde6:7a:7d20:c5a::1' . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.27 13:02:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.27 13:02:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.27 13:02:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:02:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.27 13:02:31 - OpenVPN > interactive service msg_channel=0 . 2022.05.27 13:02:31 - OpenVPN > open_tun . 2022.05.27 13:02:31 - OpenVPN > wintun device [Eddie] opened . 2022.05.27 13:02:32 - Elevated: Command:wfp . 2022.05.27 13:02:34 - Elevated: Command:wfp . 2022.05.27 13:02:34 - Elevated: Command:wfp . 2022.05.27 13:02:35 - Above log line repeated 3 times more . 2022.05.27 13:02:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 13 static 10.16.90.165 255.255.255.0 . 2022.05.27 13:02:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:02:35 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:02:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all E 2022.05.27 13:02:38 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2022.05.27 13:02:42 - OpenVPN > NETSH: command failed . 2022.05.27 13:02:42 - OpenVPN > Exiting due to fatal error ! 2022.05.27 13:02:42 - Disconnecting . 2022.05.27 13:02:43 - Elevated: Command:route-list . 2022.05.27 13:02:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:43 - Elevated: Command:route-list . 2022.05.27 13:02:43 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:44 - Elevated: Command:route-list . 2022.05.27 13:02:44 - Elevated: Command:route . 2022.05.27 13:02:44 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'interface ipv4 del route prefix="104.254.90.245/32" interface="3" nexthop="192.168.0.1" store=active', exit:0, out:'Ok.' . 2022.05.27 13:02:44 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2022.05.27 13:02:45 - Elevated: Command:route-list . 2022.05.27 13:02:45 - Routes, delete 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2022.05.27 13:02:45 - Routes, skipped for 2606:6080:2001:9:2679:addd:655:8142 : IPv6 blocked. . 2022.05.27 13:02:45 - Elevated: Command:route-list . 2022.05.27 13:02:45 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. I 2022.05.27 13:02:45 - Running event vpn.down . 2022.05.27 13:02:46 - Elevated: Command:wfp . 2022.05.27 13:02:46 - Elevated: Command:wfp . 2022.05.27 13:02:46 - Elevated: Command:wfp . 2022.05.27 13:02:46 - Above log line repeated 3 times more . 2022.05.27 13:02:46 - IPv6 restored with packet filtering. . 2022.05.27 13:02:46 - Elevated: Command:wfp . 2022.05.27 13:02:46 - Elevated: Command:wfp . 2022.05.27 13:02:47 - Elevated: Command:wfp . 2022.05.27 13:02:47 - Above log line repeated 9 times more . 2022.05.27 13:02:47 - Connection terminated. I 2022.05.27 13:02:49 - Cancel requested. ! 2022.05.27 13:02:49 - Session terminated. ! 2022.05.27 13:02:51 - Deactivation of Network Lock . 2022.05.27 13:02:51 - Elevated: Command:wfp . 2022.05.27 13:02:51 - Elevated: Command:wfp . 2022.05.27 13:02:51 - Elevated: Command:wfp . 2022.05.27 13:06:03 - Above log line repeated 49 times more ! 2022.05.27 13:06:03 - Logged out. . 2022.05.27 13:06:07 - Shutdown in progress . 2022.05.27 13:06:07 - Elevated: Command:wfp . 2022.05.27 13:06:07 - Elevated: Client soft disconnected . 2022.05.27 13:06:07 - Shutdown complete . 2022.05.27 13:15:45 - Reading options from C:\Users\ProphetPX\AppData\Local\Eddie\default.profile . 2022.05.27 13:15:47 - Elevated: Command:wfp . 2022.05.27 13:15:47 - Elevated: Command:wfp . 2022.05.27 13:15:47 - Exec(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version'; . 2022.05.27 13:15:47 - Exec(1) done in 140 ms, exit: 0, out: 'OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.27 13:15:47 - library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.27 13:15:47 - Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.27 13:15:47 - Originally developed by James Yonan . 2022.05.27 13:15:47 - Copyright (C) 2002-2021 OpenVPN Inc . 2022.05.27 13:15:47 - Compile time defines: N/A' . 2022.05.27 13:15:47 - Exec(2) of 'C:\Program Files\OpenSSH-Win64\ssh.exe', 1 args: '-V'; . 2022.05.27 13:15:47 - Exec(2) done in 94 ms, exit: 0, err: 'OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5' . 2022.05.27 13:15:47 - Exec(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version'; . 2022.05.27 13:15:47 - Exec(3) done in 125 ms, exit: 0, err: 'stunnel 5.56 on x86-pc-mingw32-gnu platform . 2022.05.27 13:15:47 - Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2022.05.27 13:15:47 - Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2022.05.27 13:15:47 - Global options: . 2022.05.27 13:15:47 - RNDbytes = 1024 . 2022.05.27 13:15:47 - RNDoverwrite = yes . 2022.05.27 13:15:47 - taskbar = yes . 2022.05.27 13:15:47 - Service-level options: . 2022.05.27 13:15:47 - ciphers = HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK . 2022.05.27 13:15:47 - ciphersuites = TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256 (with TLSv1.3) . 2022.05.27 13:15:47 - curves = X25519:P-256:X448:P-521:P-384 . 2022.05.27 13:15:47 - debug = notice . 2022.05.27 13:15:47 - logId = sequential . 2022.05.27 13:15:47 - options = NO_SSLv2 . 2022.05.27 13:15:47 - options = NO_SSLv3 . 2022.05.27 13:15:47 - sessionCacheSize = 1000 . 2022.05.27 13:15:47 - sessionCacheTimeout = 300 seconds . 2022.05.27 13:15:47 - stack = 65536 bytes . 2022.05.27 13:15:47 - TIMEOUTbusy = 300 seconds . 2022.05.27 13:15:47 - TIMEOUTclose = 60 seconds . 2022.05.27 13:15:47 - TIMEOUTconnect = 10 seconds . 2022.05.27 13:15:47 - TIMEOUTidle = 43200 seconds . 2022.05.27 13:15:47 - verify = none' . 2022.05.27 13:15:48 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.05.27 13:15:48 - SSH - Version: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe) . 2022.05.27 13:15:48 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2022.05.27 13:15:48 - Elevated: Command:wfp . 2022.05.27 13:15:49 - Elevated: Exec, path:'C:\WINDOWS\system32\netsh.exe', arg:'WFP Show Filters file="D:\TEMP\\eddie_tmp_wfp_rules.xml"', exit:0, out:'Data collection successful; output = D:\TEMP\\eddie_tmp_wfp_rules.xml' I 2022.05.27 13:15:52 - Ready . 2022.05.27 13:15:53 - Collect information about AirVPN completed