Eddie System/Environment Report - 7/17/2023 - 11:48 AM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\ProphetPX\AppData\Local\Eddie\default.profile Data path: C:\Users\ProphetPX\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 185 ms Test Ping IPv6: 158 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) proxy.mode: none network.entry.iplayer: ipv4-only network.ipv4.mode: in-block network.ipv6.mode: block network.ipv4.autoswitch: True advanced.check.route: False ---------------------------- Logs: . 2023.07.17 05:52:19 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2023.07.17 05:52:19 - Command line arguments (1): path="home" . 2023.07.17 05:52:22 - Reading options from C:\Users\ProphetPX\AppData\Local\Eddie\default.profile . 2023.07.17 05:52:24 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.07.17 05:52:24 - SSH - Version: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe) . 2023.07.17 05:52:24 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.07.17 05:52:28 - Ready . 2023.07.17 05:52:30 - Collect information about AirVPN completed I 2023.07.17 05:53:29 - Checking login ... ! 2023.07.17 05:53:30 - Logged in. ! 2023.07.17 06:00:13 - Activation of Network Lock - Windows Filtering Platform I 2023.07.17 06:00:32 - Session starting. I 2023.07.17 06:00:33 - Checking authorization ... . 2023.07.17 06:00:36 - Added new network interface "tap0", Wintun version 0.12 . 2023.07.17 06:00:37 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:00:37 - Connecting to Ginan (Canada, Vancouver) . 2023.07.17 06:00:37 - Routes, add 38.240.226.21/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:00:38 - Routes, add 38.240.226.21/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:00:38 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:00:38 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:00:38 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:00:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:00:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:00:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:00:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:00:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]38.240.226.21:443 . 2023.07.17 06:00:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:00:38 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:00:38 - OpenVPN > UDP link remote: [AF_INET]38.240.226.21:443 . 2023.07.17 06:00:38 - OpenVPN > TLS: Initial packet from [AF_INET]38.240.226.21:443, sid=f7257355 25db34d0 . 2023.07.17 06:00:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:00:38 - OpenVPN > VERIFY KU OK . 2023.07.17 06:00:38 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:00:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:00:38 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:00:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ginan, emailAddress=info@airvpn.org . 2023.07.17 06:00:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:00:40 - OpenVPN > [Ginan] Peer Connection Initiated with [AF_INET]38.240.226.21:443 . 2023.07.17 06:00:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.58.1,dhcp-option DNS6 fde6:7a:7d20:153a::1,tun-ipv6,route-gateway 10.25.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:153a::107f/64 fde6:7a:7d20:153a::1,ifconfig 10.25.58.129 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.07.17 06:00:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:00:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.58.1' . 2023.07.17 06:00:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:153a::1' . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:00:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:00:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:00:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:00:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:00:41 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:00:41 - OpenVPN > open_tun . 2023.07.17 06:00:41 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:00:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.25.58.129 255.255.255.0 . 2023.07.17 06:00:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:00:42 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:00:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:00:46 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:00:50 - OpenVPN > NETSH: command failed . 2023.07.17 06:00:50 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:00:50 - Disconnecting . 2023.07.17 06:00:50 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:51 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:51 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:52 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:53 - Routes, delete 38.240.226.21/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:00:54 - Routes, delete 38.240.226.19/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:55 - Routes, delete 2606:9580:103:13:228d:c3e1:cc6e:bda3/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:00:55 - Routes, delete 38.240.226.21/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:00:55 - Connection terminated. I 2023.07.17 06:00:58 - Checking authorization ... . 2023.07.17 06:00:59 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:00:59 - Connecting to Titawin (Canada, Vancouver) . 2023.07.17 06:01:00 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:01:00 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:01:00 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:01:00 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:01:00 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:01:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:01:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:01:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:01:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:01:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2023.07.17 06:01:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:01:00 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:01:00 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2023.07.17 06:01:01 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=a6fa8471 37e76d95 . 2023.07.17 06:01:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:01:01 - OpenVPN > VERIFY KU OK . 2023.07.17 06:01:01 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:01:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:01:01 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:01:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2023.07.17 06:01:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:01:01 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443 ! 2023.07.17 06:01:01 - Disconnecting . 2023.07.17 06:01:01 - Sending soft termination signal . 2023.07.17 06:01:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.07.17 06:01:04 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:01:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.74.1,dhcp-option DNS6 fde6:7a:7d20:104a::1,tun-ipv6,route-gateway 10.20.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104a::10b0/64 fde6:7a:7d20:104a::1,ifconfig 10.20.74.178 255.255.255.0,peer-id 11,cipher AES-256-GCM' . 2023.07.17 06:01:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:01:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.74.1' . 2023.07.17 06:01:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104a::1' . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:01:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:01:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:01:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:01:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:01:04 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:01:04 - OpenVPN > open_tun . 2023.07.17 06:01:04 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:01:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.20.74.178 255.255.255.0 . 2023.07.17 06:01:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:01:05 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:01:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:01:06 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:01:10 - OpenVPN > NETSH: command failed . 2023.07.17 06:01:10 - OpenVPN > Exiting due to fatal error . 2023.07.17 06:01:11 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:11 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:11 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:12 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:12 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:01:13 - Routes, delete 192.30.89.59/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:13 - Routes, delete 2606:9580:100:d:2bd7:c37b:24c2:c069/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:01:13 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:01:13 - Connection terminated. I 2023.07.17 06:01:13 - Cancel requested. ! 2023.07.17 06:01:14 - Session terminated. I 2023.07.17 06:05:09 - Session starting. I 2023.07.17 06:05:10 - Checking authorization ... . 2023.07.17 06:05:12 - Added new network interface "tap0", Wintun version 0.12 . 2023.07.17 06:05:12 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:05:12 - Connecting to Titawin (Canada, Vancouver) . 2023.07.17 06:05:13 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:05:13 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:05:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:05:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:05:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:05:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2023.07.17 06:05:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:05:14 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:05:14 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2023.07.17 06:05:14 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=9756be3f 98ab6d35 . 2023.07.17 06:05:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:05:14 - OpenVPN > VERIFY KU OK . 2023.07.17 06:05:14 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:05:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:05:14 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:05:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2023.07.17 06:05:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:05:14 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443 . 2023.07.17 06:05:15 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:05:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.74.1,dhcp-option DNS6 fde6:7a:7d20:104a::1,tun-ipv6,route-gateway 10.20.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104a::10b0/64 fde6:7a:7d20:104a::1,ifconfig 10.20.74.178 255.255.255.0,peer-id 18,cipher AES-256-GCM' . 2023.07.17 06:05:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:05:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.74.1' . 2023.07.17 06:05:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104a::1' . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:05:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:05:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:05:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:15 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:05:15 - OpenVPN > open_tun . 2023.07.17 06:05:15 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:05:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.20.74.178 255.255.255.0 . 2023.07.17 06:05:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:15 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:19 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:05:23 - OpenVPN > NETSH: command failed . 2023.07.17 06:05:23 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:05:23 - Disconnecting . 2023.07.17 06:05:24 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:25 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:25 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:25 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:26 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:05:27 - Routes, delete 192.30.89.59/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:28 - Routes, delete 2606:9580:100:d:2bd7:c37b:24c2:c069/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:28 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:05:28 - Connection terminated. I 2023.07.17 06:05:31 - Checking authorization ... . 2023.07.17 06:05:32 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:05:32 - Connecting to Telescopium (Canada, Vancouver) . 2023.07.17 06:05:33 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:05:33 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:05:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:05:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:05:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:05:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2023.07.17 06:05:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:05:33 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:05:33 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2023.07.17 06:05:34 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=7cc819a5 318a9dc5 . 2023.07.17 06:05:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:05:34 - OpenVPN > VERIFY KU OK . 2023.07.17 06:05:34 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:05:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:05:34 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:05:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2023.07.17 06:05:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:05:34 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2023.07.17 06:05:34 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:05:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.10.1,dhcp-option DNS6 fde6:7a:7d20:f0a::1,tun-ipv6,route-gateway 10.19.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0a::10f5/64 fde6:7a:7d20:f0a::1,ifconfig 10.19.10.247 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.07.17 06:05:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:05:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.10.1' . 2023.07.17 06:05:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0a::1' . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:05:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:05:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:05:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:35 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:05:35 - OpenVPN > open_tun . 2023.07.17 06:05:35 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:05:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.19.10.247 255.255.255.0 . 2023.07.17 06:05:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:35 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:05:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:39 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:05:43 - OpenVPN > NETSH: command failed . 2023.07.17 06:05:43 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:05:43 - Disconnecting . 2023.07.17 06:05:44 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:44 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:44 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:45 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:45 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:05:46 - Routes, delete 192.30.89.51/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:46 - Routes, delete 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:05:47 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:05:47 - Connection terminated. I 2023.07.17 06:05:50 - Checking authorization ... . 2023.07.17 06:05:51 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:05:51 - Connecting to Pisces (Canada, Vancouver) . 2023.07.17 06:05:51 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:05:52 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:05:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:05:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:05:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:05:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:05:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:05:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2023.07.17 06:05:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:05:52 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:05:52 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2023.07.17 06:05:52 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=cf7bb3a6 44827168 . 2023.07.17 06:05:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:05:52 - OpenVPN > VERIFY KU OK . 2023.07.17 06:05:52 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:05:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:05:52 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:05:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.07.17 06:05:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:05:52 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2023.07.17 06:05:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.234.1,dhcp-option DNS6 fde6:7a:7d20:bea::1,tun-ipv6,route-gateway 10.15.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bea::1054/64 fde6:7a:7d20:bea::1,ifconfig 10.15.234.86 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.07.17 06:05:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:05:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.234.1' . 2023.07.17 06:05:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bea::1' . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:05:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:05:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:05:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:05:53 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:05:53 - OpenVPN > open_tun . 2023.07.17 06:05:53 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:05:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.15.234.86 255.255.255.0 . 2023.07.17 06:05:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:54 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:05:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:05:58 - OpenVPN > ERROR: netsh command failed: returned error code 1 ! 2023.07.17 06:05:59 - Disconnecting . 2023.07.17 06:05:59 - Sending soft termination signal . 2023.07.17 06:06:02 - OpenVPN > NETSH: command failed . 2023.07.17 06:06:02 - OpenVPN > Exiting due to fatal error . 2023.07.17 06:06:03 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:03 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:04 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:04 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:05 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:06:05 - Routes, delete 192.30.89.27/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:05 - Routes, delete 2606:9580:103:a:fda7:1f4c:8c40:8c3e/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:06:06 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:06:06 - Connection terminated. I 2023.07.17 06:06:06 - Cancel requested. ! 2023.07.17 06:06:06 - Session terminated. ! 2023.07.17 06:06:30 - Deactivation of Network Lock ! 2023.07.17 06:07:25 - Activation of Network Lock - Windows Filtering Platform I 2023.07.17 06:08:11 - Session starting. I 2023.07.17 06:08:13 - Checking authorization ... . 2023.07.17 06:08:15 - Added new network interface "tap0", Wintun version 0.12 . 2023.07.17 06:08:15 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:08:15 - Connecting to Titawin (Canada, Vancouver) . 2023.07.17 06:08:16 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:08:16 - Routes, add 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:08:16 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:08:16 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:08:16 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:08:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:08:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:08:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:08:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:08:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2023.07.17 06:08:16 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:08:16 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:08:16 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2023.07.17 06:08:16 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=daab235b 4c3ab05c . 2023.07.17 06:08:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:08:16 - OpenVPN > VERIFY KU OK . 2023.07.17 06:08:16 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:08:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:08:16 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:08:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2023.07.17 06:08:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:08:16 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443 . 2023.07.17 06:08:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.74.1,dhcp-option DNS6 fde6:7a:7d20:104a::1,tun-ipv6,route-gateway 10.20.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104a::10b0/64 fde6:7a:7d20:104a::1,ifconfig 10.20.74.178 255.255.255.0,peer-id 22,cipher AES-256-GCM' . 2023.07.17 06:08:17 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:08:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.74.1' . 2023.07.17 06:08:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104a::1' . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:08:17 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:08:17 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:08:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:08:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:08:17 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:08:17 - OpenVPN > open_tun . 2023.07.17 06:08:17 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:08:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.20.74.178 255.255.255.0 . 2023.07.17 06:08:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:08:17 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:08:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:08:22 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:08:26 - OpenVPN > NETSH: command failed . 2023.07.17 06:08:26 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:08:26 - Disconnecting . 2023.07.17 06:08:26 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:27 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:27 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:28 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:29 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:08:29 - Routes, delete 192.30.89.59/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:30 - Routes, delete 2606:9580:100:d:2bd7:c37b:24c2:c069/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:31 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:08:31 - Connection terminated. I 2023.07.17 06:08:34 - Checking authorization ... . 2023.07.17 06:08:35 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:08:35 - Connecting to Aludra (Canada, Toronto, Ontario) . 2023.07.17 06:08:36 - Routes, add 104.254.90.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:08:36 - Routes, add 104.254.90.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:08:36 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:08:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:08:36 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:08:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:08:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:08:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:08:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:08:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.205:443 . 2023.07.17 06:08:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:08:36 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:08:36 - OpenVPN > UDP link remote: [AF_INET]104.254.90.205:443 ! 2023.07.17 06:08:36 - Disconnecting . 2023.07.17 06:08:36 - Sending soft termination signal . 2023.07.17 06:08:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.205:443, sid=585d2e17 40c7ea2e . 2023.07.17 06:08:39 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.07.17 06:08:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:08:39 - OpenVPN > VERIFY KU OK . 2023.07.17 06:08:39 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:08:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:08:39 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:08:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aludra, emailAddress=info@airvpn.org . 2023.07.17 06:08:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:08:39 - OpenVPN > [Aludra] Peer Connection Initiated with [AF_INET]104.254.90.205:443 . 2023.07.17 06:08:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.90.1,dhcp-option DNS6 fde6:7a:7d20:45a::1,tun-ipv6,route-gateway 10.8.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:45a::1065/64 fde6:7a:7d20:45a::1,ifconfig 10.8.90.103 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.07.17 06:08:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:08:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.90.1' . 2023.07.17 06:08:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:45a::1' . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:08:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:08:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:08:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:08:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:08:39 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:08:39 - OpenVPN > open_tun . 2023.07.17 06:08:39 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:08:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 7 static 10.8.90.103 255.255.255.0 . 2023.07.17 06:08:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:08:39 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:08:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 7 all E 2023.07.17 06:08:41 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:08:45 - OpenVPN > NETSH: command failed . 2023.07.17 06:08:45 - OpenVPN > Exiting due to fatal error . 2023.07.17 06:08:46 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:46 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:46 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:47 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:47 - Routes, delete 104.254.90.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:08:48 - Routes, delete 104.254.90.203/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:48 - Routes, delete 2606:6080:2001:7:5c45:9163:ab64:25f3/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:08:48 - Routes, delete 104.254.90.205/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:08:48 - Connection terminated. I 2023.07.17 06:08:48 - Cancel requested. ! 2023.07.17 06:08:49 - Session terminated. ! 2023.07.17 06:08:50 - Deactivation of Network Lock . 2023.07.17 06:22:35 - Collect information about AirVPN completed ! 2023.07.17 06:32:58 - Activation of Network Lock - Windows Filtering Platform I 2023.07.17 06:33:13 - Session starting. I 2023.07.17 06:33:15 - Checking authorization ... W 2023.07.17 06:33:15 - Deprecated: please uncheck Preferences > Advanced > Force usage of old Tap driver . 2023.07.17 06:33:26 - Added new network interface "tap0", Tap0901 . 2023.07.17 06:33:26 - Using Tap0901 network interface "tap0 (TAP-Windows Adapter V9)" ! 2023.07.17 06:33:26 - Connecting to Enif (Canada, Toronto, Ontario) . 2023.07.17 06:33:27 - Routes, add 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:33:28 - Routes, add 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:33:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:33:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:33:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:33:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:33:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:33:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:33:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:33:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2023.07.17 06:33:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:33:28 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:33:28 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2023.07.17 06:33:28 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=3d2f25cf 82d0c6c9 . 2023.07.17 06:33:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:33:30 - OpenVPN > VERIFY KU OK . 2023.07.17 06:33:30 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:33:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:33:30 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:33:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2023.07.17 06:33:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:33:32 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2023.07.17 06:33:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.90.1,dhcp-option DNS6 fde6:7a:7d20:c5a::1,tun-ipv6,route-gateway 10.16.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c5a::10da/64 fde6:7a:7d20:c5a::1,ifconfig 10.16.90.220 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2023.07.17 06:33:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:33:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.90.1' . 2023.07.17 06:33:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c5a::1' . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:33:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:33:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:33:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:33:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:33:32 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:33:32 - OpenVPN > open_tun . 2023.07.17 06:33:32 - OpenVPN > tap-windows6 device [tap0] opened . 2023.07.17 06:33:33 - OpenVPN > TAP-Windows Driver Version 9.24 . 2023.07.17 06:33:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.16.90.0/10.16.90.220/255.255.255.0 [SUCCEEDED] . 2023.07.17 06:33:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.16.90.220/255.255.255.0 on interface {AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C} [DHCP-serv: 10.16.90.0, lease-time: 31536000] . 2023.07.17 06:33:33 - OpenVPN > Successful ARP Flush on interface [7] {AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C} . 2023.07.17 06:33:33 - OpenVPN > IPv4 MTU set to 1500 on interface 7 using SetIpInterfaceEntry() . 2023.07.17 06:33:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 7 fde6:7a:7d20:c5a::10da/128 store=active . 2023.07.17 06:33:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c5a::/64 -> fde6:7a:7d20:c5a::10da metric 0) dev tap0 . 2023.07.17 06:33:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c5a::/64 7 fe80::8 store=active . 2023.07.17 06:33:33 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.07.17 06:33:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 7 all E 2023.07.17 06:33:33 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:33:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 7 all E 2023.07.17 06:33:37 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:33:41 - OpenVPN > NETSH: command failed . 2023.07.17 06:33:41 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:33:41 - Disconnecting . 2023.07.17 06:33:42 - Routes, delete 0.0.0.0/1 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:42 - Routes, delete 128.0.0.0/1 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:43 - Routes, delete ::/1 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:43 - Routes, delete 8000::/1 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:44 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:33:44 - Routes, delete 104.254.90.243/32 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:45 - Routes, delete 2606:6080:2001:9:2679:addd:655:8142/128 for interface "tap0 (TAP-Windows Adapter V9)", not exists. . 2023.07.17 06:33:45 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:33:45 - Connection terminated. I 2023.07.17 06:33:48 - Cancel requested. ! 2023.07.17 06:33:48 - Session terminated. ! 2023.07.17 06:33:51 - Deactivation of Network Lock ! 2023.07.17 06:44:14 - Activation of Network Lock - Windows Filtering Platform I 2023.07.17 06:44:25 - Session starting. I 2023.07.17 06:44:27 - Checking authorization ... . 2023.07.17 06:44:29 - Added new network interface "tap0", Wintun version 0.12 . 2023.07.17 06:44:30 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:44:30 - Connecting to Telescopium (Canada, Vancouver) . 2023.07.17 06:44:31 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:44:32 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:44:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:44:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:44:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:44:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:44:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:44:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:44:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:44:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2023.07.17 06:44:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:44:32 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:44:32 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2023.07.17 06:44:32 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=2a957c69 12a29b57 . 2023.07.17 06:44:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:44:32 - OpenVPN > VERIFY KU OK . 2023.07.17 06:44:32 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:44:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:44:32 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:44:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2023.07.17 06:44:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:44:33 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2023.07.17 06:44:33 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:44:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.10.1,dhcp-option DNS6 fde6:7a:7d20:f0a::1,tun-ipv6,route-gateway 10.19.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0a::10f5/64 fde6:7a:7d20:f0a::1,ifconfig 10.19.10.247 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.07.17 06:44:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:44:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.10.1' . 2023.07.17 06:44:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0a::1' . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:44:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:44:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:44:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:44:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:44:33 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:44:33 - OpenVPN > open_tun . 2023.07.17 06:44:33 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:44:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 31 static 10.19.10.247 255.255.255.0 . 2023.07.17 06:44:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 31 all E 2023.07.17 06:44:34 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:44:38 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 31 all E 2023.07.17 06:44:38 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:44:42 - OpenVPN > NETSH: command failed . 2023.07.17 06:44:42 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:44:42 - Disconnecting . 2023.07.17 06:44:42 - Sending soft termination signal . 2023.07.17 06:44:43 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:43 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:44 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:44 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:45 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:44:46 - Routes, delete 192.30.89.51/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:46 - Routes, delete 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:44:46 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:44:47 - Connection terminated. I 2023.07.17 06:44:50 - Checking authorization ... . 2023.07.17 06:44:51 - Using WinTun network interface "tap0 (Wintun Userspace Tunnel)" ! 2023.07.17 06:44:51 - Connecting to Pisces (Canada, Vancouver) . 2023.07.17 06:44:51 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:44:52 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:44:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:44:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:44:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:44:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:44:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:44:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:44:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:44:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2023.07.17 06:44:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:44:52 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:44:52 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2023.07.17 06:44:52 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=82254204 2d91bea9 . 2023.07.17 06:44:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:44:52 - OpenVPN > VERIFY KU OK . 2023.07.17 06:44:52 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:44:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:44:52 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:44:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.07.17 06:44:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:44:53 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2023.07.17 06:44:53 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:44:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.234.1,dhcp-option DNS6 fde6:7a:7d20:bea::1,tun-ipv6,route-gateway 10.15.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bea::1054/64 fde6:7a:7d20:bea::1,ifconfig 10.15.234.86 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.07.17 06:44:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:44:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.234.1' . 2023.07.17 06:44:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bea::1' . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:44:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:44:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:44:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:44:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:44:53 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:44:53 - OpenVPN > open_tun . 2023.07.17 06:44:53 - OpenVPN > wintun device [tap0] opened . 2023.07.17 06:44:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 31 static 10.15.234.86 255.255.255.0 . 2023.07.17 06:44:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 31 all E 2023.07.17 06:44:54 - OpenVPN > ERROR: netsh command failed: returned error code 1 ! 2023.07.17 06:44:56 - Disconnecting . 2023.07.17 06:44:56 - Sending soft termination signal . 2023.07.17 06:44:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 31 all E 2023.07.17 06:44:59 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:45:02 - OpenVPN > NETSH: command failed . 2023.07.17 06:45:02 - OpenVPN > Exiting due to fatal error . 2023.07.17 06:45:03 - Routes, delete 0.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:03 - Routes, delete 128.0.0.0/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:04 - Routes, delete ::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:04 - Routes, delete 8000::/1 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:05 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:45:06 - Routes, delete 192.30.89.27/32 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:06 - Routes, delete 2606:9580:103:a:fda7:1f4c:8c40:8c3e/128 for interface "tap0 (Wintun Userspace Tunnel)", not exists. . 2023.07.17 06:45:06 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:45:06 - Connection terminated. I 2023.07.17 06:45:06 - Cancel requested. ! 2023.07.17 06:45:07 - Session terminated. I 2023.07.17 06:47:23 - Session starting. I 2023.07.17 06:47:25 - Checking authorization ... . 2023.07.17 06:47:27 - Added new network interface "Eddie", Wintun version 0.12 . 2023.07.17 06:47:28 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.07.17 06:47:28 - IPv6 disabled with packet filtering. ! 2023.07.17 06:47:28 - Connecting to Telescopium (Canada, Vancouver) . 2023.07.17 06:47:29 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:47:30 - Routes, add 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:47:30 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:47:30 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:47:30 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:47:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:47:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:47:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:47:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:47:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2023.07.17 06:47:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:47:30 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:47:30 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2023.07.17 06:47:30 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=0ba92e3d 81dd1705 . 2023.07.17 06:47:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:47:30 - OpenVPN > VERIFY KU OK . 2023.07.17 06:47:30 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:47:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:47:30 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:47:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2023.07.17 06:47:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:47:30 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2023.07.17 06:47:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.10.1,dhcp-option DNS6 fde6:7a:7d20:f0a::1,tun-ipv6,route-gateway 10.19.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0a::10f5/64 fde6:7a:7d20:f0a::1,ifconfig 10.19.10.247 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.07.17 06:47:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:47:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.10.1' . 2023.07.17 06:47:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0a::1' . 2023.07.17 06:47:31 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2023.07.17 06:47:31 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:f0a::10f5/64 fde6:7a:7d20:f0a::1' . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:47:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:47:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:47:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:47:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:47:31 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:47:31 - OpenVPN > open_tun . 2023.07.17 06:47:31 - OpenVPN > wintun device [Eddie] opened . 2023.07.17 06:47:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 32 static 10.19.10.247 255.255.255.0 . 2023.07.17 06:47:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 32 all E 2023.07.17 06:47:32 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 32 all E 2023.07.17 06:47:36 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:47:40 - OpenVPN > NETSH: command failed . 2023.07.17 06:47:40 - OpenVPN > Exiting due to fatal error ! 2023.07.17 06:47:40 - Disconnecting . 2023.07.17 06:47:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:47:41 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:47:42 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:47:43 - Routes, delete 192.30.89.51/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:47:43 - Routes, skipped for 2606:9580:100:c:8757:8ee:ec9c:991c : IPv6 blocked. . 2023.07.17 06:47:43 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:47:43 - IPv6 restored with packet filtering. . 2023.07.17 06:47:43 - Connection terminated. I 2023.07.17 06:47:46 - Checking authorization ... . 2023.07.17 06:47:48 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.07.17 06:47:48 - IPv6 disabled with packet filtering. ! 2023.07.17 06:47:48 - Connecting to Pisces (Canada, Vancouver) . 2023.07.17 06:47:49 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:47:49 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.07.17 06:47:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.07.17 06:47:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.07.17 06:47:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.07.17 06:47:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:47:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:47:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.07.17 06:47:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.07.17 06:47:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2023.07.17 06:47:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.07.17 06:47:49 - OpenVPN > UDP link local: (not bound) . 2023.07.17 06:47:49 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2023.07.17 06:47:49 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=6c3614af 0e98c6f1 . 2023.07.17 06:47:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.07.17 06:47:49 - OpenVPN > VERIFY KU OK . 2023.07.17 06:47:49 - OpenVPN > Validating certificate extended key usage . 2023.07.17 06:47:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.07.17 06:47:49 - OpenVPN > VERIFY EKU OK . 2023.07.17 06:47:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.07.17 06:47:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.07.17 06:47:50 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2023.07.17 06:47:50 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1) . 2023.07.17 06:47:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.234.1,dhcp-option DNS6 fde6:7a:7d20:bea::1,tun-ipv6,route-gateway 10.15.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bea::1054/64 fde6:7a:7d20:bea::1,ifconfig 10.15.234.86 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2023.07.17 06:47:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.07.17 06:47:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.234.1' . 2023.07.17 06:47:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bea::1' . 2023.07.17 06:47:50 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2023.07.17 06:47:50 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:bea::1054/64 fde6:7a:7d20:bea::1' . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.07.17 06:47:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.07.17 06:47:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.07.17 06:47:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:47:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.07.17 06:47:50 - OpenVPN > interactive service msg_channel=0 . 2023.07.17 06:47:50 - OpenVPN > open_tun . 2023.07.17 06:47:50 - OpenVPN > wintun device [Eddie] opened . 2023.07.17 06:47:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 32 static 10.15.234.86 255.255.255.0 . 2023.07.17 06:47:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 32 all E 2023.07.17 06:47:51 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2023.07.17 06:47:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 32 all E 2023.07.17 06:47:55 - OpenVPN > ERROR: netsh command failed: returned error code 1 ! 2023.07.17 06:47:56 - Disconnecting . 2023.07.17 06:47:56 - Sending soft termination signal . 2023.07.17 06:47:59 - OpenVPN > NETSH: command failed . 2023.07.17 06:47:59 - OpenVPN > Exiting due to fatal error . 2023.07.17 06:48:00 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:48:00 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:48:01 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.07.17 06:48:02 - Routes, delete 192.30.89.27/32 for interface "Eddie (Eddie Tunnel)", not exists. . 2023.07.17 06:48:02 - Routes, skipped for 2606:9580:103:a:fda7:1f4c:8c40:8c3e : IPv6 blocked. . 2023.07.17 06:48:03 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.07.17 06:48:03 - IPv6 restored with packet filtering. . 2023.07.17 06:48:03 - Connection terminated. I 2023.07.17 06:48:03 - Cancel requested. ! 2023.07.17 06:48:05 - Session terminated. ! 2023.07.17 06:48:06 - Deactivation of Network Lock ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface_index": 6, "metric": 0, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "10.16.90.0\/24", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "10.16.90.220\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "10.16.90.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "169.254.0.0\/16", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "169.254.197.185\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "169.254.255.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "192.168.0.0\/24", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "192.168.0.99\/32", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "192.168.0.255\/32", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "::\/0", "gateway": "fe80::4a00:33ff:fef5:7e45", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "2603:8090:1b00:6d00::\/56", "gateway": "fe80::4a00:33ff:fef5:7e45", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "2603:8090:1b00:6d00::\/64", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "2603:8090:1b00:6d00::1\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "2603:8090:1b00:6d00:286a:150a:c516:cf22\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "2603:8090:1b00:6d00:b14f:db3b:da4b:86a2\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "fde6:7a:7d20:c5a::\/64", "gateway": "fe80::8", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "fde6:7a:7d20:c5a::10da\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "fe80::14be:39c1:160a:a7d3\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" }, { "destination": "fe80::3bc8:5815:65f9:4fab\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}" }, { "destination": "fe80::8b19:82c1:802:8f6f\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "fe80::ded1:7f07:9602:ba29\/128", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{FBFCC664-1057-491D-9D6B-305339325BBC}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}" } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}", "ipv6-default-gateway": "fe80::4a00:33ff:fef5:7e45", "ipv6-default-interface": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}", "interfaces": [ { "friendly": "Ethernet", "id": "{5132215A-075A-48D0-8966-CF5FB7FFC44D}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "9647495440", "bytes_sent": "1769927871", "support_ipv4": true, "support_ipv6": true, "ips": [ "2603:8090:1b00:6d00::1", "2603:8090:1b00:6d00:286a:150a:c516:cf22", "2603:8090:1b00:6d00:b14f:db3b:da4b:86a2", "fe80::8b19:82c1:802:8f6f", "192.168.0.99" ], "bind": true, "dns4": "208.67.222.222,208.67.220.220", "dns6": null }, { "friendly": "Ethernet 2", "id": "{FBFCC664-1057-491D-9D6B-305339325BBC}", "name": "Ethernet 2", "description": "VirtualBox Host-Only Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ded1:7f07:9602:ba29", "169.254.197.185" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "tap0 1", "id": "{AF973AC2-E34B-49B4-BCD6-37DDEFC5E63C}", "name": "tap0 1", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "608", "bytes_sent": "8828", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:c5a::10da", "fe80::14be:39c1:160a:a7d3", "10.16.90.220" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection 2", "id": "{1C0778B7-79AB-421C-8EB7-1D5BABD7F728}", "name": "Bluetooth Network Connection 2", "description": "Bluetooth Device (Personal Area Network) #2", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::3bc8:5815:65f9:4fab", "169.254.24.253" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : C001-RIGEL Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : search.charter.com Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 50-E5-49-B4-1B-8F DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2603:8090:1b00:6d00::1(Preferred) Lease Obtained. . . . . . . . . . : Friday, July 14, 2023 12:26:52 PM Lease Expires . . . . . . . . . . : Monday, July 17, 2023 7:43:15 AM IPv6 Address. . . . . . . . . . . : 2603:8090:1b00:6d00:286a:150a:c516:cf22(Preferred) Temporary IPv6 Address. . . . . . : 2603:8090:1b00:6d00:b14f:db3b:da4b:86a2(Deprecated) Link-local IPv6 Address . . . . . : fe80::8b19:82c1:802:8f6f%6(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.99(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, July 14, 2023 12:26:42 PM Lease Expires . . . . . . . . . . : Friday, August 11, 2023 12:26:38 PM Default Gateway . . . . . . . . . : fe80::4a00:33ff:fef5:7e45%6 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 89187657 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter Physical Address. . . . . . . . . : 0A-00-27-00-00-0B DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::ded1:7f07:9602:ba29%11(Preferred) Autoconfiguration IPv4 Address. . : 169.254.197.185(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 67764263 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F NetBIOS over Tcpip. . . . . . . . : Enabled Unknown adapter tap0 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-AF-97-3A-C2 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Bluetooth Network Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) #2 Physical Address. . . . . . . . . : 00-1A-7D-DA-71-13 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes