. 2023.02.13 12:38:04 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home N, Version: Microsoft Windows NT 10.0.22000.0, Mono/.Net: v4.0.30319 . 2023.02.13 12:38:09 - Reading options from C:\Pkgs\Tools\Internet\AirVPN\default.profile . 2023.02.13 12:38:12 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Pkgs\Tools\Internet\AirVPN\openvpn.exe) . 2023.02.13 12:38:12 - SSH - Version: plink 0.73 (C:\Pkgs\Tools\Internet\AirVPN\plink.exe) . 2023.02.13 12:38:12 - SSL - Version: stunnel 5.56 (C:\Pkgs\Tools\Internet\AirVPN\stunnel.exe) ! 2023.02.13 12:38:13 - Activation of Network Lock - Windows Filtering Platform I 2023.02.13 12:38:14 - Ready . 2023.02.13 12:38:14 - Collect information about AirVPN completed I 2023.02.13 12:38:15 - Session starting. I 2023.02.13 12:38:15 - Checking authorization ... . 2023.02.13 12:38:15 - Collect information about AirVPN completed . 2023.02.13 12:38:16 - Added new network interface "Eddie", Wintun version 0.12 . 2023.02.13 12:38:16 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.13 12:38:16 - Connecting to Edasich (Netherlands, Alblasserdam) . 2023.02.13 12:38:17 - Routes, add 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.02.13 12:38:17 - Routes, add 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.02.13 12:38:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.13 12:38:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.13 12:38:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.13 12:38:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 12:38:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 12:38:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 12:38:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 12:38:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.213:443 . 2023.02.13 12:38:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.13 12:38:19 - OpenVPN > UDP link local: (not bound) . 2023.02.13 12:38:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.213:443 . 2023.02.13 12:38:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.213:443, sid=e7faa816 ec85b52f . 2023.02.13 12:38:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 12:38:19 - OpenVPN > VERIFY KU OK . 2023.02.13 12:38:19 - OpenVPN > Validating certificate extended key usage . 2023.02.13 12:38:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 12:38:19 - OpenVPN > VERIFY EKU OK . 2023.02.13 12:38:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Edasich, emailAddress=info@airvpn.org . 2023.02.13 12:38:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 12:38:19 - OpenVPN > [Edasich] Peer Connection Initiated with [AF_INET]213.152.161.213:443 . 2023.02.13 12:38:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.26.1,dhcp-option DNS6 fde6:7a:7d20:c1a::1,tun-ipv6,route-gateway 10.16.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c1a::1048/64 fde6:7a:7d20:c1a::1,ifconfig 10.16.26.74 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.02.13 12:38:19 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.13 12:38:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.26.1' . 2023.02.13 12:38:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c1a::1' . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.13 12:38:19 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.13 12:38:19 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.13 12:38:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 12:38:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 12:38:19 - OpenVPN > interactive service msg_channel=0 . 2023.02.13 12:38:19 - OpenVPN > open_tun . 2023.02.13 12:38:20 - OpenVPN > wintun device [Eddie] opened . 2023.02.13 12:38:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 15 static 10.16.26.74 255.255.255.0 . 2023.02.13 12:38:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 15 all . 2023.02.13 12:38:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 15 all . 2023.02.13 12:38:24 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 12:38:24 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 15 fde6:7a:7d20:c1a::1048/128 store=active . 2023.02.13 12:38:24 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c1a::/64 -> fde6:7a:7d20:c1a::1048 metric 0) dev Eddie . 2023.02.13 12:38:24 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c1a::/64 15 fe80::8 store=active . 2023.02.13 12:38:24 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.02.13 12:38:24 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 15 all . 2023.02.13 12:38:24 - OpenVPN > IPv6 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 12:38:24 - OpenVPN > Initialization Sequence Completed . 2023.02.13 12:38:25 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.13 12:38:25 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.13 12:38:25 - DNS leak protection with packet filtering enabled. . 2023.02.13 12:38:26 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:26 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:26 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from manual (10.22.58.1) to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:27 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:27 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:28 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:28 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:28 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:28 - Routes, add 213.152.161.211/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:29 - Routes, add 2a00:1678:2470:51:1972:243f:617d:80c8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:29 - Flushing DNS I 2023.02.13 12:38:29 - Checking route IPv4 . 2023.02.13 12:38:36 - Checking route (4° try) . 2023.02.13 12:38:40 - Checking route (5° try) E 2023.02.13 12:38:40 - Checking route IPv4 failed, last reason: Fetch url error:SSL connect error ! 2023.02.13 12:38:40 - Disconnecting . 2023.02.13 12:38:40 - Sending soft termination signal . 2023.02.13 12:38:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.13 12:38:45 - OpenVPN > Closing TUN/TAP interface . 2023.02.13 12:38:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:c1a::/64) . 2023.02.13 12:38:45 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c1a::/64 15 fe80::8 store=active . 2023.02.13 12:38:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 15 fde6:7a:7d20:c1a::1048 store=active . 2023.02.13 12:38:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 15 10.16.26.74 store=active . 2023.02.13 12:38:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.13 12:38:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:47 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:47 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:47 - Routes, delete 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.02.13 12:38:47 - Routes, delete 213.152.161.211/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:48 - Routes, delete 2a00:1678:2470:51:1972:243f:617d:80c8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:48 - Routes, delete 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.02.13 12:38:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.13 12:38:48 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.02.13 12:38:48 - DNS IPv4 of a network adapter restored to original settings (VirtualBox Host-Only Network, to 10.22.58.1) . 2023.02.13 12:38:48 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2023.02.13 12:38:48 - DNS leak protection with packet filtering disabled. . 2023.02.13 12:38:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.13 12:38:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.13 12:38:48 - Connection terminated. I 2023.02.13 12:38:51 - Checking authorization ... . 2023.02.13 12:38:52 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.13 12:38:52 - Connecting to Alphirk (Netherlands, Alblasserdam) . 2023.02.13 12:38:52 - Routes, add 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.02.13 12:38:52 - Routes, add 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.02.13 12:38:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.13 12:38:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.13 12:38:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.13 12:38:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 12:38:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 12:38:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 12:38:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 12:38:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.217:443 . 2023.02.13 12:38:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.13 12:38:52 - OpenVPN > UDP link local: (not bound) . 2023.02.13 12:38:52 - OpenVPN > UDP link remote: [AF_INET]213.152.187.217:443 . 2023.02.13 12:38:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.217:443, sid=f317da15 d4a1ff9a . 2023.02.13 12:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 12:38:52 - OpenVPN > VERIFY KU OK . 2023.02.13 12:38:52 - OpenVPN > Validating certificate extended key usage . 2023.02.13 12:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 12:38:52 - OpenVPN > VERIFY EKU OK . 2023.02.13 12:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 12:38:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 12:38:52 - OpenVPN > [Alphirk] Peer Connection Initiated with [AF_INET]213.152.187.217:443 . 2023.02.13 12:38:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.122.1,dhcp-option DNS6 fde6:7a:7d20:37a::1,tun-ipv6,route-gateway 10.7.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:37a::10b3/64 fde6:7a:7d20:37a::1,ifconfig 10.7.122.181 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.02.13 12:38:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.13 12:38:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.122.1' . 2023.02.13 12:38:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:37a::1' . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.13 12:38:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.13 12:38:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.13 12:38:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 12:38:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 12:38:53 - OpenVPN > interactive service msg_channel=0 . 2023.02.13 12:38:53 - OpenVPN > open_tun . 2023.02.13 12:38:53 - OpenVPN > wintun device [Eddie] opened . 2023.02.13 12:38:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 15 static 10.7.122.181 255.255.255.0 . 2023.02.13 12:38:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 15 all . 2023.02.13 12:38:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 15 all . 2023.02.13 12:38:53 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 12:38:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 15 fde6:7a:7d20:37a::10b3/128 store=active . 2023.02.13 12:38:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:37a::/64 -> fde6:7a:7d20:37a::10b3 metric 0) dev Eddie . 2023.02.13 12:38:53 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:37a::/64 15 fe80::8 store=active . 2023.02.13 12:38:53 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.02.13 12:38:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 15 all . 2023.02.13 12:38:54 - OpenVPN > IPv6 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 12:38:54 - OpenVPN > Initialization Sequence Completed . 2023.02.13 12:38:54 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.13 12:38:54 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.13 12:38:54 - DNS leak protection with packet filtering enabled. . 2023.02.13 12:38:54 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:54 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:55 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from manual (10.22.58.1) to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:55 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 12:38:55 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:56 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:56 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:56 - Routes, add 213.152.187.215/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:57 - Routes, add 2a00:1678:1337:7a22:73d7:eb5b:9990:2323/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 12:38:57 - Flushing DNS I 2023.02.13 12:38:57 - Checking route IPv4 I 2023.02.13 12:38:57 - Checking route IPv6 ! 2023.02.13 12:38:57 - Connected. . 2023.02.13 13:08:16 - Collect information about AirVPN completed . 2023.02.13 13:37:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 13:37:15 - OpenVPN > VERIFY KU OK . 2023.02.13 13:37:15 - OpenVPN > Validating certificate extended key usage . 2023.02.13 13:37:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 13:37:15 - OpenVPN > VERIFY EKU OK . 2023.02.13 13:37:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 13:37:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 13:37:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 13:37:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 13:38:16 - Collect information about AirVPN completed . 2023.02.13 14:08:15 - Collect information about AirVPN completed . 2023.02.13 14:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 14:35:38 - OpenVPN > VERIFY KU OK . 2023.02.13 14:35:38 - OpenVPN > Validating certificate extended key usage . 2023.02.13 14:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 14:35:38 - OpenVPN > VERIFY EKU OK . 2023.02.13 14:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 14:35:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 14:35:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 14:35:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 14:38:16 - Collect information about AirVPN completed . 2023.02.13 15:08:19 - Collect information about AirVPN completed . 2023.02.13 15:34:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 15:34:02 - OpenVPN > VERIFY KU OK . 2023.02.13 15:34:02 - OpenVPN > Validating certificate extended key usage . 2023.02.13 15:34:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 15:34:02 - OpenVPN > VERIFY EKU OK . 2023.02.13 15:34:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 15:34:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 15:34:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 15:34:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 15:38:22 - Collect information about AirVPN completed . 2023.02.13 16:08:24 - Collect information about AirVPN completed . 2023.02.13 16:32:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 16:32:26 - OpenVPN > VERIFY KU OK . 2023.02.13 16:32:26 - OpenVPN > Validating certificate extended key usage . 2023.02.13 16:32:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 16:32:26 - OpenVPN > VERIFY EKU OK . 2023.02.13 16:32:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 16:32:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 16:32:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 16:32:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 16:38:33 - Collect information about AirVPN completed . 2023.02.13 17:08:43 - Collect information about AirVPN completed . 2023.02.13 17:30:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 17:30:48 - OpenVPN > VERIFY KU OK . 2023.02.13 17:30:48 - OpenVPN > Validating certificate extended key usage . 2023.02.13 17:30:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 17:30:48 - OpenVPN > VERIFY EKU OK . 2023.02.13 17:30:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 17:30:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 17:30:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 17:30:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 17:38:42 - Collect information about AirVPN completed ! 2023.02.13 18:02:30 - Disconnecting . 2023.02.13 18:02:30 - Sending soft termination signal . 2023.02.13 18:02:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.13 18:02:35 - OpenVPN > Closing TUN/TAP interface . 2023.02.13 18:02:35 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:37a::/64) . 2023.02.13 18:02:35 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:37a::/64 15 fe80::8 store=active . 2023.02.13 18:02:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 15 fde6:7a:7d20:37a::10b3 store=active . 2023.02.13 18:02:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 15 10.7.122.181 store=active . 2023.02.13 18:02:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.13 18:02:36 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:36 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:36 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:37 - Routes, delete 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.02.13 18:02:37 - Routes, delete 213.152.187.215/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:37 - Routes, delete 2a00:1678:1337:7a22:73d7:eb5b:9990:2323/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.13 18:02:37 - Routes, delete 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.02.13 18:02:37 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.13 18:02:37 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.02.13 18:02:37 - DNS IPv4 of a network adapter restored to original settings (VirtualBox Host-Only Network, to 10.22.58.1) . 2023.02.13 18:02:38 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2023.02.13 18:02:38 - DNS leak protection with packet filtering disabled. . 2023.02.13 18:02:38 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.13 18:02:38 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.13 18:02:38 - Connection terminated. . 2023.02.13 18:02:38 - Flushing DNS ! 2023.02.13 18:02:38 - Session terminated. ! 2023.02.13 18:02:39 - Deactivation of Network Lock . 2023.02.13 18:08:50 - Collect information about AirVPN completed . 2023.02.13 18:38:50 - Collect information about AirVPN completed . 2023.02.13 19:08:50 - Collect information about AirVPN completed . 2023.02.13 20:48:03 - Above log line repeated 3 times more I 2023.02.13 20:48:03 - Session starting. I 2023.02.13 20:48:03 - Checking authorization ... . 2023.02.13 20:48:05 - Added new network interface "Eddie", Wintun version 0.12 . 2023.02.13 20:48:05 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.02.13 20:48:05 - Connecting to Alphirk (Netherlands, Alblasserdam) . 2023.02.13 20:48:05 - Routes, add 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.02.13 20:48:05 - Routes, add 213.152.187.217/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.02.13 20:48:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.13 20:48:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.13 20:48:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.13 20:48:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 20:48:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 20:48:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.13 20:48:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.13 20:48:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.217:443 . 2023.02.13 20:48:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.13 20:48:05 - OpenVPN > UDP link local: (not bound) . 2023.02.13 20:48:05 - OpenVPN > UDP link remote: [AF_INET]213.152.187.217:443 . 2023.02.13 20:48:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.217:443, sid=73a05926 5bcea278 . 2023.02.13 20:48:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 20:48:05 - OpenVPN > VERIFY KU OK . 2023.02.13 20:48:05 - OpenVPN > Validating certificate extended key usage . 2023.02.13 20:48:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 20:48:05 - OpenVPN > VERIFY EKU OK . 2023.02.13 20:48:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 20:48:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 20:48:06 - OpenVPN > [Alphirk] Peer Connection Initiated with [AF_INET]213.152.187.217:443 . 2023.02.13 20:48:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.122.1,dhcp-option DNS6 fde6:7a:7d20:37a::1,tun-ipv6,route-gateway 10.7.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:37a::10b3/64 fde6:7a:7d20:37a::1,ifconfig 10.7.122.181 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.02.13 20:48:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.13 20:48:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.122.1' . 2023.02.13 20:48:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:37a::1' . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.13 20:48:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.13 20:48:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.13 20:48:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 20:48:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 20:48:06 - OpenVPN > interactive service msg_channel=0 . 2023.02.13 20:48:06 - OpenVPN > open_tun . 2023.02.13 20:48:06 - OpenVPN > wintun device [Eddie] opened . 2023.02.13 20:48:06 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 15 static 10.7.122.181 255.255.255.0 . 2023.02.13 20:48:06 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 15 all . 2023.02.13 20:48:06 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 15 all . 2023.02.13 20:48:06 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 20:48:06 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 15 fde6:7a:7d20:37a::10b3/128 store=active . 2023.02.13 20:48:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:37a::/64 -> fde6:7a:7d20:37a::10b3 metric 0) dev Eddie . 2023.02.13 20:48:07 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:37a::/64 15 fe80::8 store=active . 2023.02.13 20:48:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.02.13 20:48:07 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 15 all . 2023.02.13 20:48:07 - OpenVPN > IPv6 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.02.13 20:48:07 - OpenVPN > Initialization Sequence Completed . 2023.02.13 20:48:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.13 20:48:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.13 20:48:07 - DNS leak protection with packet filtering enabled. . 2023.02.13 20:48:08 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 20:48:08 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 20:48:08 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from manual (10.22.58.1) to 1.0.0.1, 1.1.1.1) . 2023.02.13 20:48:08 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 1.0.0.1, 1.1.1.1) . 2023.02.13 20:48:09 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:09 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:10 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:10 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:10 - Routes, add 213.152.187.215/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:10 - Routes, add 2a00:1678:1337:7a22:73d7:eb5b:9990:2323/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.02.13 20:48:10 - Flushing DNS I 2023.02.13 20:48:10 - Checking route IPv4 I 2023.02.13 20:48:11 - Checking route IPv6 ! 2023.02.13 20:48:11 - Connected. . 2023.02.13 21:09:26 - Collect information about AirVPN completed . 2023.02.13 21:39:36 - Collect information about AirVPN completed . 2023.02.13 21:45:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.13 21:45:04 - OpenVPN > VERIFY KU OK . 2023.02.13 21:45:04 - OpenVPN > Validating certificate extended key usage . 2023.02.13 21:45:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.13 21:45:04 - OpenVPN > VERIFY EKU OK . 2023.02.13 21:45:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2023.02.13 21:45:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 21:45:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.13 21:45:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.13 22:09:46 - Collect information about AirVPN completed