. 2022.08.10 16:57:49 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2fa::/64) . 2022.08.10 16:57:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.10 16:57:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:2fa::10d4 store=active . 2022.08.10 16:57:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.6.250.214 store=active . 2022.08.10 16:57:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.10 16:57:50 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:50 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:51 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:51 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:51 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.10 16:57:52 - Routes, delete 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:52 - Routes, delete 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 16:57:52 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.10 16:57:52 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.10 16:57:53 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.10 16:57:55 - DNS leak protection with packet filtering disabled. . 2022.08.10 16:57:55 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.10 16:57:55 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.10 16:57:55 - Connection terminated. . 2022.08.10 16:57:55 - Flushing DNS ! 2022.08.10 16:57:55 - Session terminated. . 2022.08.10 17:00:58 - Collect information about AirVPN completed I 2022.08.10 17:04:02 - Session starting. I 2022.08.10 17:04:04 - Checking authorization ... . 2022.08.10 17:04:05 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.10 17:04:05 - Connecting to Struve (Singapore, Singapore) . 2022.08.10 17:04:05 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.10 17:04:05 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.10 17:04:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.10 17:04:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.10 17:04:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.10 17:04:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.10 17:04:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.10 17:04:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.10 17:04:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.10 17:04:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.183.81:443 . 2022.08.10 17:04:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.10 17:04:05 - OpenVPN > UDP link local: (not bound) . 2022.08.10 17:04:05 - OpenVPN > UDP link remote: [AF_INET]209.58.183.81:443 . 2022.08.10 17:04:05 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.183.81:443, sid=01c4d90d ed7bc648 . 2022.08.10 17:04:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 17:04:05 - OpenVPN > VERIFY KU OK . 2022.08.10 17:04:05 - OpenVPN > Validating certificate extended key usage . 2022.08.10 17:04:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 17:04:05 - OpenVPN > VERIFY EKU OK . 2022.08.10 17:04:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 17:04:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 17:04:06 - OpenVPN > [Struve] Peer Connection Initiated with [AF_INET]209.58.183.81:443 . 2022.08.10 17:04:06 - OpenVPN > SENT CONTROL [Struve]: 'PUSH_REQUEST' (status=1) . 2022.08.10 17:04:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.250.1,dhcp-option DNS6 fde6:7a:7d20:2fa::1,tun-ipv6,route-gateway 10.6.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2fa::10d4/64 fde6:7a:7d20:2fa::1,ifconfig 10.6.250.214 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.08.10 17:04:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.10 17:04:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.250.1' . 2022.08.10 17:04:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2fa::1' . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.10 17:04:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.10 17:04:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.10 17:04:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 17:04:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 17:04:06 - OpenVPN > interactive service msg_channel=0 . 2022.08.10 17:04:06 - OpenVPN > open_tun . 2022.08.10 17:04:06 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.10 17:04:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.6.250.214 255.255.255.0 . 2022.08.10 17:04:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.10 17:04:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.10 17:04:07 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.10 17:04:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:2fa::10d4/128 store=active . 2022.08.10 17:04:07 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2fa::/64 -> fde6:7a:7d20:2fa::10d4 metric 0) dev Local Area Connection 2 . 2022.08.10 17:04:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.10 17:04:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.10 17:04:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.10 17:04:07 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.10 17:04:07 - OpenVPN > Initialization Sequence Completed . 2022.08.10 17:04:07 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.10 17:04:07 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.10 17:04:07 - DNS leak protection with packet filtering enabled. . 2022.08.10 17:04:07 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 8.8.8.8) . 2022.08.10 17:04:07 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 8.8.8.8) . 2022.08.10 17:04:07 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 8.8.8.8) . 2022.08.10 17:04:07 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 8.8.8.8) . 2022.08.10 17:04:07 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 8.8.8.8) . 2022.08.10 17:04:08 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 8.8.8.8) . 2022.08.10 17:04:08 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 8.8.8.8) . 2022.08.10 17:04:08 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:09 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:09 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:10 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:10 - Routes, add 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:12 - Routes, add 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.10 17:04:12 - Flushing DNS ! 2022.08.10 17:04:12 - Connected. . 2022.08.10 17:30:58 - Collect information about AirVPN completed . 2022.08.10 17:59:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 17:59:51 - OpenVPN > VERIFY KU OK . 2022.08.10 17:59:51 - OpenVPN > Validating certificate extended key usage . 2022.08.10 17:59:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 17:59:51 - OpenVPN > VERIFY EKU OK . 2022.08.10 17:59:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 17:59:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 17:59:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 17:59:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 18:01:05 - Collect information about AirVPN completed . 2022.08.10 18:31:12 - Collect information about AirVPN completed . 2022.08.10 18:55:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 18:55:35 - OpenVPN > VERIFY KU OK . 2022.08.10 18:55:35 - OpenVPN > Validating certificate extended key usage . 2022.08.10 18:55:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 18:55:35 - OpenVPN > VERIFY EKU OK . 2022.08.10 18:55:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 18:55:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 18:55:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 18:55:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 19:01:19 - Collect information about AirVPN completed . 2022.08.10 19:31:22 - Collect information about AirVPN completed . 2022.08.10 19:51:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 19:51:20 - OpenVPN > VERIFY KU OK . 2022.08.10 19:51:20 - OpenVPN > Validating certificate extended key usage . 2022.08.10 19:51:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 19:51:20 - OpenVPN > VERIFY EKU OK . 2022.08.10 19:51:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 19:51:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 19:51:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 19:51:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 20:01:30 - Collect information about AirVPN completed . 2022.08.10 20:31:39 - Collect information about AirVPN completed . 2022.08.10 20:47:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 20:47:05 - OpenVPN > VERIFY KU OK . 2022.08.10 20:47:05 - OpenVPN > Validating certificate extended key usage . 2022.08.10 20:47:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 20:47:05 - OpenVPN > VERIFY EKU OK . 2022.08.10 20:47:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 20:47:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 20:47:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 20:47:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 21:01:47 - Collect information about AirVPN completed . 2022.08.10 21:31:48 - Collect information about AirVPN completed . 2022.08.10 21:42:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 21:42:50 - OpenVPN > VERIFY KU OK . 2022.08.10 21:42:50 - OpenVPN > Validating certificate extended key usage . 2022.08.10 21:42:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 21:42:50 - OpenVPN > VERIFY EKU OK . 2022.08.10 21:42:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 21:42:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 21:42:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 21:42:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 22:01:50 - Collect information about AirVPN completed . 2022.08.10 22:31:55 - Collect information about AirVPN completed . 2022.08.10 22:38:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 22:38:35 - OpenVPN > VERIFY KU OK . 2022.08.10 22:38:35 - OpenVPN > Validating certificate extended key usage . 2022.08.10 22:38:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 22:38:35 - OpenVPN > VERIFY EKU OK . 2022.08.10 22:38:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 22:38:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 22:38:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 22:38:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.10 23:01:59 - Collect information about AirVPN completed . 2022.08.10 23:32:02 - Collect information about AirVPN completed . 2022.08.10 23:34:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.10 23:34:20 - OpenVPN > VERIFY KU OK . 2022.08.10 23:34:20 - OpenVPN > Validating certificate extended key usage . 2022.08.10 23:34:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.10 23:34:20 - OpenVPN > VERIFY EKU OK . 2022.08.10 23:34:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.10 23:34:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 23:34:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.10 23:34:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 00:02:08 - Collect information about AirVPN completed . 2022.08.11 00:30:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 00:30:08 - OpenVPN > VERIFY KU OK . 2022.08.11 00:30:08 - OpenVPN > Validating certificate extended key usage . 2022.08.11 00:30:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 00:30:08 - OpenVPN > VERIFY EKU OK . 2022.08.11 00:30:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 00:30:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 00:30:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 00:30:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 00:32:14 - Collect information about AirVPN completed . 2022.08.11 01:02:20 - Collect information about AirVPN completed . 2022.08.11 01:25:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 01:25:53 - OpenVPN > VERIFY KU OK . 2022.08.11 01:25:53 - OpenVPN > Validating certificate extended key usage . 2022.08.11 01:25:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 01:25:53 - OpenVPN > VERIFY EKU OK . 2022.08.11 01:25:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 01:25:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 01:25:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 01:25:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 01:32:23 - Collect information about AirVPN completed . 2022.08.11 01:44:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6062140 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.08.11 01:44:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6062141 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.08.11 01:44:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6062142 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.08.11 02:02:27 - Above log line repeated 486 times more . 2022.08.11 02:02:27 - Collect information about AirVPN completed . 2022.08.11 02:21:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 02:21:38 - OpenVPN > VERIFY KU OK . 2022.08.11 02:21:38 - OpenVPN > Validating certificate extended key usage . 2022.08.11 02:21:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 02:21:38 - OpenVPN > VERIFY EKU OK . 2022.08.11 02:21:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 02:21:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 02:21:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 02:21:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 02:32:35 - Collect information about AirVPN completed . 2022.08.11 03:02:43 - Collect information about AirVPN completed . 2022.08.11 03:17:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 03:17:23 - OpenVPN > VERIFY KU OK . 2022.08.11 03:17:23 - OpenVPN > Validating certificate extended key usage . 2022.08.11 03:17:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 03:17:23 - OpenVPN > VERIFY EKU OK . 2022.08.11 03:17:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 03:17:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 03:17:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 03:17:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 03:32:50 - Collect information about AirVPN completed . 2022.08.11 04:02:58 - Collect information about AirVPN completed . 2022.08.11 04:13:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 04:13:07 - OpenVPN > VERIFY KU OK . 2022.08.11 04:13:07 - OpenVPN > Validating certificate extended key usage . 2022.08.11 04:13:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 04:13:07 - OpenVPN > VERIFY EKU OK . 2022.08.11 04:13:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 04:13:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 04:13:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 04:13:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 04:33:04 - Collect information about AirVPN completed . 2022.08.11 05:03:11 - Collect information about AirVPN completed . 2022.08.11 05:08:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 05:08:53 - OpenVPN > VERIFY KU OK . 2022.08.11 05:08:53 - OpenVPN > Validating certificate extended key usage . 2022.08.11 05:08:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 05:08:53 - OpenVPN > VERIFY EKU OK . 2022.08.11 05:08:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 05:08:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 05:08:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 05:08:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 05:33:18 - Collect information about AirVPN completed . 2022.08.11 06:03:24 - Collect information about AirVPN completed . 2022.08.11 06:04:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 06:04:37 - OpenVPN > VERIFY KU OK . 2022.08.11 06:04:37 - OpenVPN > Validating certificate extended key usage . 2022.08.11 06:04:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 06:04:37 - OpenVPN > VERIFY EKU OK . 2022.08.11 06:04:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 06:04:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 06:04:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 06:04:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 06:33:31 - Collect information about AirVPN completed . 2022.08.11 07:00:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 07:00:23 - OpenVPN > VERIFY KU OK . 2022.08.11 07:00:23 - OpenVPN > Validating certificate extended key usage . 2022.08.11 07:00:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 07:00:23 - OpenVPN > VERIFY EKU OK . 2022.08.11 07:00:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 07:00:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 07:00:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 07:00:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 07:03:38 - Collect information about AirVPN completed . 2022.08.11 07:33:45 - Collect information about AirVPN completed . 2022.08.11 07:56:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 07:56:07 - OpenVPN > VERIFY KU OK . 2022.08.11 07:56:07 - OpenVPN > Validating certificate extended key usage . 2022.08.11 07:56:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 07:56:07 - OpenVPN > VERIFY EKU OK . 2022.08.11 07:56:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 07:56:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 07:56:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 07:56:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 08:03:52 - Collect information about AirVPN completed . 2022.08.11 08:34:00 - Collect information about AirVPN completed . 2022.08.11 08:51:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 08:51:52 - OpenVPN > VERIFY KU OK . 2022.08.11 08:51:52 - OpenVPN > Validating certificate extended key usage . 2022.08.11 08:51:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 08:51:52 - OpenVPN > VERIFY EKU OK . 2022.08.11 08:51:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 08:51:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 08:51:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 08:51:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 09:04:06 - Collect information about AirVPN completed . 2022.08.11 09:34:09 - Collect information about AirVPN completed . 2022.08.11 09:47:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 09:47:37 - OpenVPN > VERIFY KU OK . 2022.08.11 09:47:37 - OpenVPN > Validating certificate extended key usage . 2022.08.11 09:47:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 09:47:37 - OpenVPN > VERIFY EKU OK . 2022.08.11 09:47:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 09:47:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 09:47:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 09:47:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 10:04:11 - Collect information about AirVPN completed . 2022.08.11 10:34:12 - Collect information about AirVPN completed . 2022.08.11 10:43:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 10:43:21 - OpenVPN > VERIFY KU OK . 2022.08.11 10:43:21 - OpenVPN > Validating certificate extended key usage . 2022.08.11 10:43:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 10:43:21 - OpenVPN > VERIFY EKU OK . 2022.08.11 10:43:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 10:43:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 10:43:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 10:43:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 11:04:14 - Collect information about AirVPN completed . 2022.08.11 11:34:16 - Collect information about AirVPN completed . 2022.08.11 11:39:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 11:39:06 - OpenVPN > VERIFY KU OK . 2022.08.11 11:39:06 - OpenVPN > Validating certificate extended key usage . 2022.08.11 11:39:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 11:39:06 - OpenVPN > VERIFY EKU OK . 2022.08.11 11:39:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 11:39:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 11:39:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 11:39:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 12:04:19 - Collect information about AirVPN completed . 2022.08.11 12:34:24 - Collect information about AirVPN completed . 2022.08.11 12:34:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 12:34:51 - OpenVPN > VERIFY KU OK . 2022.08.11 12:34:51 - OpenVPN > Validating certificate extended key usage . 2022.08.11 12:34:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 12:34:51 - OpenVPN > VERIFY EKU OK . 2022.08.11 12:34:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 12:34:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 12:34:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 12:34:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 13:04:26 - Collect information about AirVPN completed . 2022.08.11 13:30:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 13:30:36 - OpenVPN > VERIFY KU OK . 2022.08.11 13:30:36 - OpenVPN > Validating certificate extended key usage . 2022.08.11 13:30:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 13:30:36 - OpenVPN > VERIFY EKU OK . 2022.08.11 13:30:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 13:30:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 13:30:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 13:30:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 13:34:28 - Collect information about AirVPN completed . 2022.08.11 14:04:31 - Collect information about AirVPN completed . 2022.08.11 14:26:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 14:26:21 - OpenVPN > VERIFY KU OK . 2022.08.11 14:26:21 - OpenVPN > Validating certificate extended key usage . 2022.08.11 14:26:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 14:26:21 - OpenVPN > VERIFY EKU OK . 2022.08.11 14:26:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 14:26:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 14:26:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 14:26:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 14:34:32 - Collect information about AirVPN completed . 2022.08.11 15:04:34 - Collect information about AirVPN completed . 2022.08.11 15:22:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 15:22:06 - OpenVPN > VERIFY KU OK . 2022.08.11 15:22:06 - OpenVPN > Validating certificate extended key usage . 2022.08.11 15:22:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 15:22:06 - OpenVPN > VERIFY EKU OK . 2022.08.11 15:22:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 15:22:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 15:22:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 15:22:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 15:34:36 - Collect information about AirVPN completed . 2022.08.11 16:04:39 - Collect information about AirVPN completed . 2022.08.11 16:17:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 16:17:51 - OpenVPN > VERIFY KU OK . 2022.08.11 16:17:51 - OpenVPN > Validating certificate extended key usage . 2022.08.11 16:17:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 16:17:51 - OpenVPN > VERIFY EKU OK . 2022.08.11 16:17:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 16:17:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 16:17:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 16:17:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 16:34:41 - Collect information about AirVPN completed ! 2022.08.11 16:57:06 - Disconnecting . 2022.08.11 16:57:06 - Sending soft termination signal . 2022.08.11 16:57:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 16:57:10 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 16:57:10 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2fa::/64) . 2022.08.11 16:57:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.11 16:57:10 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:2fa::10d4 store=active . 2022.08.11 16:57:10 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.6.250.214 store=active . 2022.08.11 16:57:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 16:57:11 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:12 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:12 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:12 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:13 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 16:57:13 - Routes, delete 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:14 - Routes, delete 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:57:14 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 16:57:14 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 16:57:16 - DNS leak protection with packet filtering disabled. . 2022.08.11 16:57:16 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 16:57:16 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 16:57:16 - Connection terminated. . 2022.08.11 16:57:16 - Flushing DNS ! 2022.08.11 16:57:17 - Session terminated. I 2022.08.11 16:58:31 - Session starting. I 2022.08.11 16:58:33 - Checking authorization ... . 2022.08.11 16:58:34 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.11 16:58:34 - Connecting to Struve (Singapore, Singapore) . 2022.08.11 16:58:35 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 16:58:35 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.11 16:58:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.11 16:58:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.11 16:58:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.11 16:58:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 16:58:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 16:58:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 16:58:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 16:58:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.183.81:443 . 2022.08.11 16:58:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.11 16:58:35 - OpenVPN > UDP link local: (not bound) . 2022.08.11 16:58:35 - OpenVPN > UDP link remote: [AF_INET]209.58.183.81:443 . 2022.08.11 16:58:35 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.183.81:443, sid=ade73c24 0f6b7397 . 2022.08.11 16:58:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 16:58:35 - OpenVPN > VERIFY KU OK . 2022.08.11 16:58:35 - OpenVPN > Validating certificate extended key usage . 2022.08.11 16:58:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 16:58:35 - OpenVPN > VERIFY EKU OK . 2022.08.11 16:58:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 16:58:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 16:58:35 - OpenVPN > [Struve] Peer Connection Initiated with [AF_INET]209.58.183.81:443 . 2022.08.11 16:58:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.250.1,dhcp-option DNS6 fde6:7a:7d20:2fa::1,tun-ipv6,route-gateway 10.6.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2fa::10d4/64 fde6:7a:7d20:2fa::1,ifconfig 10.6.250.214 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.08.11 16:58:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.11 16:58:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.250.1' . 2022.08.11 16:58:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2fa::1' . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.11 16:58:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.11 16:58:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.11 16:58:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 16:58:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 16:58:36 - OpenVPN > interactive service msg_channel=0 . 2022.08.11 16:58:36 - OpenVPN > open_tun . 2022.08.11 16:58:36 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.11 16:58:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.6.250.214 255.255.255.0 . 2022.08.11 16:58:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.11 16:58:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.11 16:58:37 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 16:58:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:2fa::10d4/128 store=active . 2022.08.11 16:58:37 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2fa::/64 -> fde6:7a:7d20:2fa::10d4 metric 0) dev Local Area Connection 2 . 2022.08.11 16:58:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.11 16:58:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.11 16:58:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.11 16:58:37 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 16:58:37 - OpenVPN > Initialization Sequence Completed . 2022.08.11 16:58:37 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.11 16:58:37 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.11 16:58:37 - DNS leak protection with packet filtering enabled. . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 8.8.8.8) . 2022.08.11 16:58:38 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 8.8.8.8) . 2022.08.11 16:58:39 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:40 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:40 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:41 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:42 - Routes, add 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:43 - Routes, add 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 16:58:43 - Flushing DNS ! 2022.08.11 16:58:43 - Connected. ! 2022.08.11 17:02:06 - Disconnecting . 2022.08.11 17:02:06 - Sending soft termination signal . 2022.08.11 17:02:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 17:02:11 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 17:02:11 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2fa::/64) . 2022.08.11 17:02:11 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.11 17:02:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:2fa::10d4 store=active . 2022.08.11 17:02:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.6.250.214 store=active . 2022.08.11 17:02:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 17:02:12 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:13 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:13 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:14 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:14 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:02:14 - Routes, delete 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:15 - Routes, delete 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:15 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 17:02:15 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 17:02:15 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 17:02:15 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 17:02:15 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 17:02:16 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 17:02:16 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 17:02:16 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 17:02:18 - DNS leak protection with packet filtering disabled. . 2022.08.11 17:02:18 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 17:02:18 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 17:02:18 - Connection terminated. . 2022.08.11 17:02:18 - Flushing DNS ! 2022.08.11 17:02:18 - Session terminated. ! 2022.08.11 17:02:46 - Activation of Network Lock - Windows Filtering Platform I 2022.08.11 17:02:48 - Session starting. I 2022.08.11 17:02:50 - Checking authorization ... . 2022.08.11 17:02:51 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.11 17:02:51 - Connecting to Struve (Singapore, Singapore) . 2022.08.11 17:02:52 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:02:52 - Routes, add 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.11 17:02:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.11 17:02:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.11 17:02:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.11 17:02:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:02:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:02:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:02:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:02:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.183.81:443 . 2022.08.11 17:02:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.11 17:02:52 - OpenVPN > UDP link local: (not bound) . 2022.08.11 17:02:52 - OpenVPN > UDP link remote: [AF_INET]209.58.183.81:443 . 2022.08.11 17:02:52 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.183.81:443, sid=082be96d cd571f14 . 2022.08.11 17:02:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 17:02:52 - OpenVPN > VERIFY KU OK . 2022.08.11 17:02:52 - OpenVPN > Validating certificate extended key usage . 2022.08.11 17:02:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 17:02:52 - OpenVPN > VERIFY EKU OK . 2022.08.11 17:02:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Struve, emailAddress=info@airvpn.org . 2022.08.11 17:02:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 17:02:52 - OpenVPN > [Struve] Peer Connection Initiated with [AF_INET]209.58.183.81:443 . 2022.08.11 17:02:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.250.1,dhcp-option DNS6 fde6:7a:7d20:2fa::1,tun-ipv6,route-gateway 10.6.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2fa::10d4/64 fde6:7a:7d20:2fa::1,ifconfig 10.6.250.214 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.08.11 17:02:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.11 17:02:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.250.1' . 2022.08.11 17:02:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2fa::1' . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.11 17:02:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.11 17:02:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.11 17:02:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:02:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:02:52 - OpenVPN > interactive service msg_channel=0 . 2022.08.11 17:02:52 - OpenVPN > open_tun . 2022.08.11 17:02:52 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.11 17:02:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.6.250.214 255.255.255.0 . 2022.08.11 17:02:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.11 17:02:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.11 17:02:53 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:02:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:2fa::10d4/128 store=active . 2022.08.11 17:02:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2fa::/64 -> fde6:7a:7d20:2fa::10d4 metric 0) dev Local Area Connection 2 . 2022.08.11 17:02:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.11 17:02:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.11 17:02:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.11 17:02:53 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:02:53 - OpenVPN > Initialization Sequence Completed . 2022.08.11 17:02:53 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.11 17:02:53 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.11 17:02:53 - DNS leak protection with packet filtering enabled. . 2022.08.11 17:02:54 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:54 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:54 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:54 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:55 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:55 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:55 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:02:55 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:56 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:57 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:58 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:59 - Routes, add 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:59 - Routes, add 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:02:59 - Flushing DNS ! 2022.08.11 17:02:59 - Connected. . 2022.08.11 17:04:43 - Collect information about AirVPN completed ! 2022.08.11 17:29:36 - Disconnecting . 2022.08.11 17:29:36 - Sending soft termination signal . 2022.08.11 17:29:39 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 17:29:41 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 17:29:41 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2fa::/64) . 2022.08.11 17:29:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2fa::/64 21 fe80::8 store=active . 2022.08.11 17:29:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:2fa::10d4 store=active . 2022.08.11 17:29:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.6.250.214 store=active . 2022.08.11 17:29:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 17:29:42 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:43 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:43 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:44 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:44 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:29:45 - Routes, delete 209.58.183.78/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:45 - Routes, delete 2001:df1:800:a007:4::2010/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:29:45 - Routes, delete 209.58.183.81/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 17:29:45 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 17:29:45 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 17:29:46 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 17:29:46 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 17:29:46 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 17:29:46 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 17:29:46 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 17:29:48 - DNS leak protection with packet filtering disabled. . 2022.08.11 17:29:48 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 17:29:48 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 17:29:48 - Connection terminated. . 2022.08.11 17:29:48 - Flushing DNS ! 2022.08.11 17:29:48 - Session terminated. . 2022.08.11 17:29:49 - Collect information about AirVPN completed . 2022.08.11 17:29:52 - Collect information about AirVPN completed . 2022.08.11 17:30:02 - Collect information about AirVPN completed I 2022.08.11 17:30:58 - Session starting. I 2022.08.11 17:31:00 - Checking authorization ... . 2022.08.11 17:31:01 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.11 17:31:01 - Connecting to Lacaille (Singapore, Singapore) . 2022.08.11 17:31:02 - Routes, add 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:31:02 - Routes, add 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.11 17:31:02 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.11 17:31:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.11 17:31:02 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.11 17:31:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:31:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:31:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:31:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:31:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.173.159:443 . 2022.08.11 17:31:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.11 17:31:02 - OpenVPN > UDP link local: (not bound) . 2022.08.11 17:31:02 - OpenVPN > UDP link remote: [AF_INET]209.58.173.159:443 . 2022.08.11 17:31:02 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.173.159:443, sid=dc3a4b4b 68215243 . 2022.08.11 17:31:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 17:31:02 - OpenVPN > VERIFY KU OK . 2022.08.11 17:31:02 - OpenVPN > Validating certificate extended key usage . 2022.08.11 17:31:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 17:31:02 - OpenVPN > VERIFY EKU OK . 2022.08.11 17:31:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 17:31:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 17:31:02 - OpenVPN > [Lacaille] Peer Connection Initiated with [AF_INET]209.58.173.159:443 . 2022.08.11 17:31:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.58.1,dhcp-option DNS6 fde6:7a:7d20:183a::1,tun-ipv6,route-gateway 10.28.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:183a::109e/64 fde6:7a:7d20:183a::1,ifconfig 10.28.58.160 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.08.11 17:31:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.11 17:31:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.58.1' . 2022.08.11 17:31:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:183a::1' . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.11 17:31:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.11 17:31:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.11 17:31:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:31:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:31:03 - OpenVPN > interactive service msg_channel=0 . 2022.08.11 17:31:03 - OpenVPN > open_tun . 2022.08.11 17:31:03 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.11 17:31:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.28.58.160 255.255.255.0 . 2022.08.11 17:31:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.11 17:31:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.11 17:31:04 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:31:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:183a::109e/128 store=active . 2022.08.11 17:31:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:183a::/64 -> fde6:7a:7d20:183a::109e metric 0) dev Local Area Connection 2 . 2022.08.11 17:31:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:183a::/64 21 fe80::8 store=active . 2022.08.11 17:31:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.11 17:31:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.11 17:31:04 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:31:04 - OpenVPN > Initialization Sequence Completed . 2022.08.11 17:31:04 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.11 17:31:04 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.11 17:31:04 - DNS leak protection with packet filtering enabled. . 2022.08.11 17:31:04 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.28.58.1) . 2022.08.11 17:31:05 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:05 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 10.28.58.1) . 2022.08.11 17:31:05 - DNS IPv6 of a network adapter forced (Local Area Connection 2, from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:05 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 10.28.58.1) . 2022.08.11 17:31:05 - DNS IPv6 of a network adapter forced (vEthernet (Default Switch), from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:05 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 10.28.58.1) . 2022.08.11 17:31:05 - DNS IPv6 of a network adapter forced (vEthernet (Wi-Fi), from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:05 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.28.58.1) . 2022.08.11 17:31:05 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:05 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 10.28.58.1) . 2022.08.11 17:31:06 - DNS IPv6 of a network adapter forced (vEthernet (Ethernet 2), from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:06 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 10.28.58.1) . 2022.08.11 17:31:06 - DNS IPv6 of a network adapter forced (vEthernet (Ethernet), from automatic to fde6:7a:7d20:183a::1) . 2022.08.11 17:31:07 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:07 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:08 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:09 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:10 - Routes, add 209.58.173.138/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:10 - Routes, add 2001:df1:800:a00e:4::a44e/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:31:10 - Flushing DNS I 2022.08.11 17:31:10 - Checking DNS ! 2022.08.11 17:31:34 - Connected. ! 2022.08.11 17:37:42 - Disconnecting . 2022.08.11 17:37:42 - Sending soft termination signal . 2022.08.11 17:37:46 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 17:37:47 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 17:37:47 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:183a::/64) . 2022.08.11 17:37:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:183a::/64 21 fe80::8 store=active . 2022.08.11 17:37:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:183a::109e store=active . 2022.08.11 17:37:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.28.58.160 store=active . 2022.08.11 17:37:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 17:37:48 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:48 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:49 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:49 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:50 - Routes, delete 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:37:50 - Routes, delete 209.58.173.138/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:51 - Routes, delete 2001:df1:800:a00e:4::a44e/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:37:51 - Routes, delete 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 17:37:51 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 17:37:51 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 17:37:51 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 17:37:51 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 17:37:51 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 17:37:51 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 17:37:51 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 17:37:51 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 17:37:51 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 17:37:52 - DNS IPv6 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 17:37:52 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 17:37:52 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 17:37:52 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 17:37:52 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 17:37:54 - DNS leak protection with packet filtering disabled. . 2022.08.11 17:37:54 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 17:37:54 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 17:37:54 - Connection terminated. . 2022.08.11 17:37:54 - Flushing DNS ! 2022.08.11 17:37:54 - Session terminated. I 2022.08.11 17:37:55 - Session starting. I 2022.08.11 17:37:58 - Checking authorization ... . 2022.08.11 17:37:59 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.11 17:37:59 - Connecting to Lacaille (Singapore, Singapore) . 2022.08.11 17:37:59 - Routes, add 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 17:38:00 - Routes, add 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.11 17:38:00 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.11 17:38:00 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.11 17:38:00 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.11 17:38:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:38:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:38:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 17:38:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 17:38:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.173.159:443 . 2022.08.11 17:38:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.11 17:38:00 - OpenVPN > UDP link local: (not bound) . 2022.08.11 17:38:00 - OpenVPN > UDP link remote: [AF_INET]209.58.173.159:443 . 2022.08.11 17:38:00 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.173.159:443, sid=22bcea40 012f94d6 . 2022.08.11 17:38:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 17:38:00 - OpenVPN > VERIFY KU OK . 2022.08.11 17:38:00 - OpenVPN > Validating certificate extended key usage . 2022.08.11 17:38:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 17:38:00 - OpenVPN > VERIFY EKU OK . 2022.08.11 17:38:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 17:38:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 17:38:00 - OpenVPN > [Lacaille] Peer Connection Initiated with [AF_INET]209.58.173.159:443 . 2022.08.11 17:38:00 - OpenVPN > SENT CONTROL [Lacaille]: 'PUSH_REQUEST' (status=1) . 2022.08.11 17:38:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.58.1,dhcp-option DNS6 fde6:7a:7d20:183a::1,tun-ipv6,route-gateway 10.28.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:183a::109e/64 fde6:7a:7d20:183a::1,ifconfig 10.28.58.160 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.08.11 17:38:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.11 17:38:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.58.1' . 2022.08.11 17:38:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:183a::1' . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.11 17:38:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.11 17:38:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.11 17:38:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:38:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 17:38:00 - OpenVPN > interactive service msg_channel=0 . 2022.08.11 17:38:00 - OpenVPN > open_tun . 2022.08.11 17:38:00 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.11 17:38:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.28.58.160 255.255.255.0 . 2022.08.11 17:38:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.11 17:38:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.11 17:38:01 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:38:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:183a::109e/128 store=active . 2022.08.11 17:38:01 - OpenVPN > add_route_ipv6(fde6:7a:7d20:183a::/64 -> fde6:7a:7d20:183a::109e metric 0) dev Local Area Connection 2 . 2022.08.11 17:38:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:183a::/64 21 fe80::8 store=active . 2022.08.11 17:38:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.11 17:38:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.11 17:38:01 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 17:38:01 - OpenVPN > Initialization Sequence Completed . 2022.08.11 17:38:01 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.11 17:38:01 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.11 17:38:01 - DNS leak protection with packet filtering enabled. . 2022.08.11 17:38:02 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:02 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:02 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:02 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:03 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:03 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:03 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 129.250.35.250, 129.250.35.251) . 2022.08.11 17:38:03 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:04 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:05 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:06 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:07 - Routes, add 209.58.173.138/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:07 - Routes, add 2001:df1:800:a00e:4::a44e/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 17:38:07 - Flushing DNS ! 2022.08.11 17:38:07 - Connected. . 2022.08.11 18:00:07 - Collect information about AirVPN completed . 2022.08.11 18:30:13 - Collect information about AirVPN completed . 2022.08.11 18:37:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 18:37:03 - OpenVPN > VERIFY KU OK . 2022.08.11 18:37:03 - OpenVPN > Validating certificate extended key usage . 2022.08.11 18:37:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 18:37:03 - OpenVPN > VERIFY EKU OK . 2022.08.11 18:37:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 18:37:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 18:37:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 18:37:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 19:00:20 - Collect information about AirVPN completed . 2022.08.11 19:30:34 - Collect information about AirVPN completed . 2022.08.11 19:36:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 19:36:03 - OpenVPN > VERIFY KU OK . 2022.08.11 19:36:04 - OpenVPN > Validating certificate extended key usage . 2022.08.11 19:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 19:36:04 - OpenVPN > VERIFY EKU OK . 2022.08.11 19:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 19:36:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 19:36:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 19:36:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 20:00:49 - Collect information about AirVPN completed . 2022.08.11 20:31:30 - Collect information about AirVPN completed . 2022.08.11 20:35:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 20:35:04 - OpenVPN > VERIFY KU OK . 2022.08.11 20:35:04 - OpenVPN > Validating certificate extended key usage . 2022.08.11 20:35:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 20:35:04 - OpenVPN > VERIFY EKU OK . 2022.08.11 20:35:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 20:35:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 20:35:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 20:35:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 21:34:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 21:34:05 - OpenVPN > VERIFY KU OK . 2022.08.11 21:34:05 - OpenVPN > Validating certificate extended key usage . 2022.08.11 21:34:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 21:34:05 - OpenVPN > VERIFY EKU OK . 2022.08.11 21:34:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.08.11 21:34:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 21:34:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 21:34:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 ! 2022.08.11 21:45:40 - Disconnecting . 2022.08.11 21:45:40 - Sending soft termination signal . 2022.08.11 21:45:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 21:45:45 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 21:45:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:183a::/64) . 2022.08.11 21:45:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:183a::/64 21 fe80::8 store=active . 2022.08.11 21:45:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:183a::109e store=active . 2022.08.11 21:45:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.28.58.160 store=active . 2022.08.11 21:45:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 21:45:45 - Collect information about AirVPN ..., 1° try failed (Fetch url error:Failure when receiving data from the peer) . 2022.08.11 21:45:46 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:47 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:47 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:48 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:48 - Routes, delete 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 21:45:48 - Routes, delete 209.58.173.138/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:49 - Routes, delete 2001:df1:800:a00e:4::a44e/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:45:49 - Routes, delete 209.58.173.159/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 21:45:49 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 21:45:50 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 21:45:51 - DNS leak protection with packet filtering disabled. . 2022.08.11 21:45:51 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 21:45:52 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 21:45:52 - Connection terminated. . 2022.08.11 21:45:52 - Flushing DNS ! 2022.08.11 21:45:52 - Session terminated. . 2022.08.11 21:45:52 - Collect information about AirVPN completed I 2022.08.11 21:46:03 - Session starting. I 2022.08.11 21:46:06 - Checking authorization ... . 2022.08.11 21:46:07 - Using WinTun network interface "Local Area Connection 2 (Wintun Userspace Tunnel)" ! 2022.08.11 21:46:07 - Connecting to Auriga (Singapore, Singapore) . 2022.08.11 21:46:07 - Routes, add 185.200.116.213/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 21:46:08 - Routes, add 185.200.116.213/32 for interface "Ethernet 2 (USB Ethernet)", already exists. . 2022.08.11 21:46:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.08.11 21:46:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.08.11 21:46:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.08.11 21:46:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 21:46:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 21:46:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.08.11 21:46:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.08.11 21:46:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.200.116.213:443 . 2022.08.11 21:46:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.08.11 21:46:09 - OpenVPN > UDP link local: (not bound) . 2022.08.11 21:46:09 - OpenVPN > UDP link remote: [AF_INET]185.200.116.213:443 . 2022.08.11 21:46:09 - OpenVPN > TLS: Initial packet from [AF_INET]185.200.116.213:443, sid=edb6c05f 5c327b98 . 2022.08.11 21:46:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.08.11 21:46:09 - OpenVPN > VERIFY KU OK . 2022.08.11 21:46:09 - OpenVPN > Validating certificate extended key usage . 2022.08.11 21:46:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.08.11 21:46:09 - OpenVPN > VERIFY EKU OK . 2022.08.11 21:46:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Auriga, emailAddress=info@airvpn.org . 2022.08.11 21:46:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.08.11 21:46:09 - OpenVPN > [Auriga] Peer Connection Initiated with [AF_INET]185.200.116.213:443 . 2022.08.11 21:46:10 - Collect information about AirVPN completed . 2022.08.11 21:46:11 - OpenVPN > SENT CONTROL [Auriga]: 'PUSH_REQUEST' (status=1) . 2022.08.11 21:46:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.218.1,dhcp-option DNS6 fde6:7a:7d20:6da::1,tun-ipv6,route-gateway 10.10.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6da::1090/64 fde6:7a:7d20:6da::1,ifconfig 10.10.218.146 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.08.11 21:46:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.08.11 21:46:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.218.1' . 2022.08.11 21:46:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6da::1' . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.08.11 21:46:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.08.11 21:46:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.08.11 21:46:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 21:46:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.08.11 21:46:13 - OpenVPN > interactive service msg_channel=0 . 2022.08.11 21:46:13 - OpenVPN > open_tun . 2022.08.11 21:46:13 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.08.11 21:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.10.218.146 255.255.255.0 . 2022.08.11 21:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.08.11 21:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.08.11 21:46:14 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 21:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:6da::1090/128 store=active . 2022.08.11 21:46:14 - OpenVPN > add_route_ipv6(fde6:7a:7d20:6da::/64 -> fde6:7a:7d20:6da::1090 metric 0) dev Local Area Connection 2 . 2022.08.11 21:46:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:6da::/64 21 fe80::8 store=active . 2022.08.11 21:46:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.08.11 21:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.08.11 21:46:14 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.08.11 21:46:14 - OpenVPN > Initialization Sequence Completed . 2022.08.11 21:46:14 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.08.11 21:46:14 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.08.11 21:46:14 - DNS leak protection with packet filtering enabled. . 2022.08.11 21:46:15 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.10.218.1) . 2022.08.11 21:46:15 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:15 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from automatic to 10.10.218.1) . 2022.08.11 21:46:15 - DNS IPv6 of a network adapter forced (Local Area Connection 2, from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:15 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 10.10.218.1) . 2022.08.11 21:46:15 - DNS IPv6 of a network adapter forced (vEthernet (Default Switch), from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:15 - DNS IPv4 of a network adapter forced (vEthernet (Wi-Fi), from automatic to 10.10.218.1) . 2022.08.11 21:46:15 - DNS IPv6 of a network adapter forced (vEthernet (Wi-Fi), from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:15 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.10.218.1) . 2022.08.11 21:46:15 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:16 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet 2), from automatic to 10.10.218.1) . 2022.08.11 21:46:16 - DNS IPv6 of a network adapter forced (vEthernet (Ethernet 2), from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:16 - DNS IPv4 of a network adapter forced (vEthernet (Ethernet), from automatic to 10.10.218.1) . 2022.08.11 21:46:16 - DNS IPv6 of a network adapter forced (vEthernet (Ethernet), from automatic to fde6:7a:7d20:6da::1) . 2022.08.11 21:46:16 - Routes, add 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:17 - Routes, add 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:17 - Routes, add ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:18 - Routes, add 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:18 - Routes, add 185.200.116.211/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:20 - Routes, add 2a0a:b640:1:3:218c:315c:e008:53ce/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:46:20 - Flushing DNS I 2022.08.11 21:46:20 - Checking DNS ! 2022.08.11 21:46:32 - Connected. ! 2022.08.11 21:51:47 - Disconnecting . 2022.08.11 21:51:47 - Sending soft termination signal . 2022.08.11 21:51:50 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.08.11 21:51:51 - OpenVPN > Closing TUN/TAP interface . 2022.08.11 21:51:51 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:6da::/64) . 2022.08.11 21:51:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:6da::/64 21 fe80::8 store=active . 2022.08.11 21:51:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:6da::1090 store=active . 2022.08.11 21:51:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.10.218.146 store=active . 2022.08.11 21:51:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.08.11 21:51:52 - Routes, delete 0.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:53 - Routes, delete 128.0.0.0/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:53 - Routes, delete ::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:53 - Routes, delete 8000::/1 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:54 - Routes, delete 185.200.116.213/32 for interface "Ethernet 2 (USB Ethernet)". . 2022.08.11 21:51:54 - Routes, delete 185.200.116.211/32 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:55 - Routes, delete 2a0a:b640:1:3:218c:315c:e008:53ce/128 for interface "Local Area Connection 2 (Wintun Userspace Tunnel)". . 2022.08.11 21:51:55 - Routes, delete 185.200.116.213/32 for interface "Ethernet 2 (USB Ethernet)", not exists. . 2022.08.11 21:51:55 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 21:51:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2022.08.11 21:51:55 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 21:51:55 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection 2, to automatic) . 2022.08.11 21:51:55 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 21:51:55 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Default Switch), to automatic) . 2022.08.11 21:51:55 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 21:51:55 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Wi-Fi), to automatic) . 2022.08.11 21:51:56 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 21:51:56 - DNS IPv6 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.08.11 21:51:56 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 21:51:56 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Ethernet 2), to automatic) . 2022.08.11 21:51:56 - DNS IPv4 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 21:51:56 - DNS IPv6 of a network adapter restored to original settings (vEthernet (Ethernet), to automatic) . 2022.08.11 21:51:57 - DNS leak protection with packet filtering disabled. . 2022.08.11 21:51:57 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv4 . 2022.08.11 21:51:57 - Interface Local Area Connection 2 metric restored from 3 to Automatic, layer IPv6 . 2022.08.11 21:51:57 - Connection terminated. . 2022.08.11 21:51:57 - Flushing DNS ! 2022.08.11 21:51:58 - Session terminated. ! 2022.08.11 21:51:58 - Deactivation of Network Lock