Eddie System/Environment Report - 9/5/2023 - 5:09 PM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\jjg\AppData\Local\Eddie\default.profile Data path: C:\Users\jjg\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 8.8.8.8, 192.168.0.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 94 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.denylist: 43f9d9c19a8eb029c43bf7c54674ad3160600dc568dc86ad0f367bdde96c0672 proxy.mode: none ---------------------------- Logs: . 2023.09.05 08:14:57 - OpenVPN > VERIFY KU OK . 2023.09.05 08:14:57 - OpenVPN > Validating certificate extended key usage . 2023.09.05 08:14:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 08:14:57 - OpenVPN > VERIFY EKU OK . 2023.09.05 08:14:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2023.09.05 08:14:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 08:14:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 08:14:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 08:38:31 - Collect information about AirVPN completed . 2023.09.05 09:08:38 - Collect information about AirVPN completed . 2023.09.05 09:12:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 09:12:03 - OpenVPN > VERIFY KU OK . 2023.09.05 09:12:03 - OpenVPN > Validating certificate extended key usage . 2023.09.05 09:12:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 09:12:03 - OpenVPN > VERIFY EKU OK . 2023.09.05 09:12:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2023.09.05 09:12:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 09:12:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 09:12:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 09:38:46 - Collect information about AirVPN completed . 2023.09.05 10:08:53 - Collect information about AirVPN completed . 2023.09.05 10:09:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 10:09:09 - OpenVPN > VERIFY KU OK . 2023.09.05 10:09:09 - OpenVPN > Validating certificate extended key usage . 2023.09.05 10:09:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 10:09:09 - OpenVPN > VERIFY EKU OK . 2023.09.05 10:09:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2023.09.05 10:09:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 10:09:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 10:09:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 10:39:02 - Collect information about AirVPN completed . 2023.09.05 11:06:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:06:14 - OpenVPN > VERIFY KU OK . 2023.09.05 11:06:14 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:06:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:06:14 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:06:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2023.09.05 11:06:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:06:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:06:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:09:05 - Collect information about AirVPN completed ! 2023.09.05 11:34:34 - Disconnecting . 2023.09.05 11:34:34 - Sending soft termination signal . 2023.09.05 11:34:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:34:39 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:34:39 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:cb2::/64) . 2023.09.05 11:34:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:cb2::/64 28 fe80::8 store=active . 2023.09.05 11:34:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:cb2::103f store=active . 2023.09.05 11:34:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.16.178.65 store=active . 2023.09.05 11:34:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:34:39 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:39 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:39 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:40 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:40 - Routes, delete 185.189.112.13/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:34:40 - Routes, delete 185.189.112.11/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:40 - Routes, delete 2001:ac8:20:2a:c0c6:360c:e9d7:f7d4/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:34:40 - Routes, delete 185.189.112.13/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:34:40 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:34:40 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:34:40 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:34:40 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:34:40 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:34:40 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:34:40 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:34:40 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:34:40 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:34:40 - Connection terminated. . 2023.09.05 11:34:40 - Flushing DNS ! 2023.09.05 11:34:41 - Session terminated. I 2023.09.05 11:36:21 - Session starting. I 2023.09.05 11:36:22 - Checking authorization ... . 2023.09.05 11:36:23 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 11:36:23 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 11:36:23 - Connecting to Alcyone (Netherlands, Alblasserdam) . 2023.09.05 11:36:23 - Routes, add 213.152.161.119/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:36:23 - Routes, add 213.152.161.119/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 11:36:23 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 11:36:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 11:36:23 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 11:36:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:36:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:36:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:36:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:36:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.119:443 . 2023.09.05 11:36:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:36:23 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:36:23 - OpenVPN > UDP link remote: [AF_INET]213.152.161.119:443 . 2023.09.05 11:36:23 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.119:443, sid=8823d650 d6bfa34f . 2023.09.05 11:36:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:36:23 - OpenVPN > VERIFY KU OK . 2023.09.05 11:36:23 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:36:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:36:23 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:36:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alcyone, emailAddress=info@airvpn.org . 2023.09.05 11:36:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:36:23 - OpenVPN > [Alcyone] Peer Connection Initiated with [AF_INET]213.152.161.119:443 . 2023.09.05 11:36:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.210.1,dhcp-option DNS6 fde6:7a:7d20:1d2::1,tun-ipv6,route-gateway 10.5.210.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d2::101a/64 fde6:7a:7d20:1d2::1,ifconfig 10.5.210.28 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.09.05 11:36:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:36:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.210.1' . 2023.09.05 11:36:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d2::1' . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:36:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:36:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:36:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:36:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:36:23 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 11:36:23 - OpenVPN > open_tun . 2023.09.05 11:36:23 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 11:36:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.5.210.28 255.255.255.0 . 2023.09.05 11:36:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 11:36:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 11:36:23 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:36:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1d2::101a/128 store=active . 2023.09.05 11:36:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1d2::/64 -> fde6:7a:7d20:1d2::101a metric 0) dev Eddie . 2023.09.05 11:36:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1d2::/64 28 fe80::8 store=active . 2023.09.05 11:36:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 11:36:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 11:36:24 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:36:24 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:36:24 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 11:36:24 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 11:36:24 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:36:24 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.5.210.1) . 2023.09.05 11:36:24 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:36:24 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.5.210.1) . 2023.09.05 11:36:24 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:36:24 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.5.210.1) . 2023.09.05 11:36:24 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:36:24 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:24 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:25 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:25 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:25 - Routes, add 213.152.161.118/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:25 - Routes, add 2a00:1678:2470:24:159a:2993:1be:4ef/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:36:25 - Flushing DNS I 2023.09.05 11:36:25 - Checking route IPv4 . 2023.09.05 11:36:52 - Checking route (4° try) . 2023.09.05 11:37:17 - Checking route (5° try) . 2023.09.05 11:37:38 - OpenVPN > [Alcyone] Inactivity timeout (--ping-restart), restarting . 2023.09.05 11:37:38 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2023.09.05 11:37:38 - OpenVPN > Restart pause, 5 second(s) . 2023.09.05 11:37:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:37:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:37:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:37:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:37:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.119:443 . 2023.09.05 11:37:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:37:38 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:37:38 - OpenVPN > UDP link remote: [AF_INET]213.152.161.119:443 . 2023.09.05 11:37:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.119:443, sid=702984f0 cd82729b . 2023.09.05 11:37:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:37:38 - OpenVPN > VERIFY KU OK . 2023.09.05 11:37:38 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:37:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:37:38 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:37:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alcyone, emailAddress=info@airvpn.org . 2023.09.05 11:37:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:37:38 - OpenVPN > [Alcyone] Peer Connection Initiated with [AF_INET]213.152.161.119:443 . 2023.09.05 11:37:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.210.1,dhcp-option DNS6 fde6:7a:7d20:1d2::1,tun-ipv6,route-gateway 10.5.210.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d2::101a/64 fde6:7a:7d20:1d2::1,ifconfig 10.5.210.28 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.09.05 11:37:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:37:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.210.1' . 2023.09.05 11:37:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d2::1' . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:37:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:37:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:37:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:37:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:37:38 - OpenVPN > Preserving previous TUN/TAP instance: Eddie . 2023.09.05 11:37:38 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:37:38 - Windows WFP, unexpected: Rule 'dns_block_all' already exists . 2023.09.05 11:37:38 - Windows WFP, unexpected: Rule 'dns_permit_openvpn' already exists . 2023.09.05 11:37:38 - Windows WFP, unexpected: Rule 'dns_permit_tap' already exists . 2023.09.05 11:37:38 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:37:38 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:37:38 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:37:38 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1d2::1) . 2023.09.05 11:37:38 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:38 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:38 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:38 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:38 - Routes, add 213.152.161.118/32 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:39 - Routes, add 2a00:1678:2470:24:159a:2993:1be:4ef/128 for interface "Eddie (Wintun Userspace Tunnel)", already exists. . 2023.09.05 11:37:39 - Flushing DNS ! 2023.09.05 11:37:39 - Disconnecting . 2023.09.05 11:37:39 - Sending soft termination signal . 2023.09.05 11:37:42 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:37:43 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:37:43 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1d2::/64) . 2023.09.05 11:37:43 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1d2::/64 28 fe80::8 store=active . 2023.09.05 11:37:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1d2::101a store=active . 2023.09.05 11:37:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.5.210.28 store=active . 2023.09.05 11:37:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:37:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:43 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:43 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:44 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:44 - Routes, delete 213.152.161.119/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:37:44 - Routes, delete 213.152.161.118/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:44 - Routes, delete 2a00:1678:2470:24:159a:2993:1be:4ef/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:44 - Routes, delete 213.152.161.119/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:37:44 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:37:44 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:37:44 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:37:44 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:37:44 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:37:44 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:37:44 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:37:44 - Connection terminated. I 2023.09.05 11:37:44 - Cancel requested. ! 2023.09.05 11:37:45 - Session terminated. I 2023.09.05 11:37:51 - Session starting. I 2023.09.05 11:37:51 - Checking authorization ... . 2023.09.05 11:37:52 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 11:37:52 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 11:37:52 - Connecting to Caph (Netherlands, Alblasserdam) . 2023.09.05 11:37:52 - Routes, add 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:37:52 - Routes, add 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 11:37:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 11:37:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 11:37:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 11:37:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:37:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:37:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:37:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:37:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.172:443 . 2023.09.05 11:37:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:37:52 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:37:52 - OpenVPN > UDP link remote: [AF_INET]213.152.162.172:443 . 2023.09.05 11:37:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.172:443, sid=0ed99e75 f9ac3933 . 2023.09.05 11:37:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:37:52 - OpenVPN > VERIFY KU OK . 2023.09.05 11:37:52 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:37:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:37:52 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:37:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Caph, emailAddress=info@airvpn.org . 2023.09.05 11:37:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:37:52 - OpenVPN > [Caph] Peer Connection Initiated with [AF_INET]213.152.162.172:443 . 2023.09.05 11:37:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.146.1,dhcp-option DNS6 fde6:7a:7d20:892::1,tun-ipv6,route-gateway 10.12.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:892::102e/64 fde6:7a:7d20:892::1,ifconfig 10.12.146.48 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.09.05 11:37:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:37:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.146.1' . 2023.09.05 11:37:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:892::1' . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:37:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:37:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:37:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:37:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:37:52 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 11:37:52 - OpenVPN > open_tun . 2023.09.05 11:37:52 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 11:37:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.12.146.48 255.255.255.0 . 2023.09.05 11:37:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 11:37:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 11:37:53 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:37:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:892::102e/128 store=active . 2023.09.05 11:37:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:892::/64 -> fde6:7a:7d20:892::102e metric 0) dev Eddie . 2023.09.05 11:37:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:892::/64 28 fe80::8 store=active . 2023.09.05 11:37:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 11:37:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 11:37:53 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:37:53 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:37:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 11:37:53 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 11:37:53 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:37:53 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.12.146.1) . 2023.09.05 11:37:53 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:892::1) . 2023.09.05 11:37:53 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.12.146.1) . 2023.09.05 11:37:53 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:892::1) . 2023.09.05 11:37:53 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.12.146.1) . 2023.09.05 11:37:53 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:892::1) . 2023.09.05 11:37:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Routes, add 213.152.162.170/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Routes, add 2a00:1678:2470:18:c954:55da:f018:70ff/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:37:54 - Flushing DNS I 2023.09.05 11:37:54 - Checking route IPv4 . 2023.09.05 11:38:21 - Checking route (4° try) . 2023.09.05 11:38:46 - Checking route (5° try) E 2023.09.05 11:39:07 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2023.09.05 11:39:07 - Disconnecting . 2023.09.05 11:39:07 - Sending soft termination signal . 2023.09.05 11:39:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:39:12 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:39:12 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:892::/64) . 2023.09.05 11:39:12 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:892::/64 28 fe80::8 store=active . 2023.09.05 11:39:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:892::102e store=active . 2023.09.05 11:39:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.12.146.48 store=active . 2023.09.05 11:39:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:39:12 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:12 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:12 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:13 - Routes, delete 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:39:13 - Routes, delete 213.152.162.170/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:13 - Routes, delete 2a00:1678:2470:18:c954:55da:f018:70ff/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:13 - Collect information about AirVPN completed . 2023.09.05 11:39:13 - Routes, delete 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:39:13 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:39:13 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:39:13 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:39:13 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:39:13 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:39:13 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:39:13 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:39:13 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:39:13 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:39:13 - Connection terminated. I 2023.09.05 11:39:16 - Checking authorization ... . 2023.09.05 11:39:17 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 11:39:17 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2023.09.05 11:39:17 - Routes, add 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:39:17 - Routes, add 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 11:39:17 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 11:39:17 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 11:39:17 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 11:39:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:39:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:39:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:39:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:39:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.135:443 . 2023.09.05 11:39:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:39:17 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:39:17 - OpenVPN > UDP link remote: [AF_INET]213.152.161.135:443 . 2023.09.05 11:39:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.135:443, sid=e328517b 0a392f37 . 2023.09.05 11:39:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:39:17 - OpenVPN > VERIFY KU OK . 2023.09.05 11:39:17 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:39:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:39:17 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:39:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org . 2023.09.05 11:39:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:39:17 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.135:443 . 2023.09.05 11:39:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.50.1,dhcp-option DNS6 fde6:7a:7d20:1b32::1,tun-ipv6,route-gateway 10.31.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b32::109c/64 fde6:7a:7d20:1b32::1,ifconfig 10.31.50.158 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.09.05 11:39:17 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:39:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.50.1' . 2023.09.05 11:39:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b32::1' . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:39:17 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:39:17 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:39:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:39:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:39:17 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 11:39:17 - OpenVPN > open_tun . 2023.09.05 11:39:17 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 11:39:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.31.50.158 255.255.255.0 . 2023.09.05 11:39:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 11:39:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 11:39:17 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:39:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1b32::109c/128 store=active . 2023.09.05 11:39:17 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b32::/64 -> fde6:7a:7d20:1b32::109c metric 0) dev Eddie . 2023.09.05 11:39:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b32::/64 28 fe80::8 store=active . 2023.09.05 11:39:17 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 11:39:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 11:39:18 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:39:18 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:39:18 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 11:39:18 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 11:39:18 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:39:18 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.31.50.1) . 2023.09.05 11:39:18 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1b32::1) . 2023.09.05 11:39:18 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.31.50.1) . 2023.09.05 11:39:18 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1b32::1) . 2023.09.05 11:39:18 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.31.50.1) . 2023.09.05 11:39:18 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1b32::1) . 2023.09.05 11:39:18 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:18 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:19 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:19 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:19 - Routes, add 213.152.161.133/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:19 - Routes, add 2a00:1678:2470:4:6cea:a07e:e6f3:db56/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:19 - Flushing DNS I 2023.09.05 11:39:19 - Checking route IPv4 ! 2023.09.05 11:39:43 - Disconnecting . 2023.09.05 11:39:43 - Sending soft termination signal . 2023.09.05 11:39:46 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:39:48 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:39:48 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1b32::/64) . 2023.09.05 11:39:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1b32::/64 28 fe80::8 store=active . 2023.09.05 11:39:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1b32::109c store=active . 2023.09.05 11:39:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.31.50.158 store=active . 2023.09.05 11:39:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:39:48 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:48 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:48 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:48 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:49 - Routes, delete 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:39:49 - Routes, delete 213.152.161.133/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:49 - Routes, delete 2a00:1678:2470:4:6cea:a07e:e6f3:db56/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:49 - Routes, delete 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:39:49 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:39:49 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:39:49 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:39:49 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:39:49 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:39:49 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:39:49 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:39:49 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:39:49 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:39:49 - Connection terminated. I 2023.09.05 11:39:49 - Cancel requested. ! 2023.09.05 11:39:49 - Session terminated. I 2023.09.05 11:39:53 - Session starting. I 2023.09.05 11:39:53 - Checking authorization ... . 2023.09.05 11:39:54 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 11:39:54 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 11:39:54 - Connecting to Baiten (Switzerland, Zurich) . 2023.09.05 11:39:54 - Routes, add 185.156.175.53/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:39:54 - Routes, add 185.156.175.53/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 11:39:54 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 11:39:54 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 11:39:54 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 11:39:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:39:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:39:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:39:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:39:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.53:443 . 2023.09.05 11:39:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:39:54 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:39:54 - OpenVPN > UDP link remote: [AF_INET]185.156.175.53:443 . 2023.09.05 11:39:54 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.53:443, sid=3eb59440 4f574f31 . 2023.09.05 11:39:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:39:54 - OpenVPN > VERIFY KU OK . 2023.09.05 11:39:54 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:39:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:39:54 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:39:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Baiten, emailAddress=info@airvpn.org . 2023.09.05 11:39:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:39:54 - OpenVPN > [Baiten] Peer Connection Initiated with [AF_INET]185.156.175.53:443 . 2023.09.05 11:39:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.82.1,dhcp-option DNS6 fde6:7a:7d20:752::1,tun-ipv6,route-gateway 10.11.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:752::10ec/64 fde6:7a:7d20:752::1,ifconfig 10.11.82.238 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.09.05 11:39:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:39:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.82.1' . 2023.09.05 11:39:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:752::1' . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:39:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:39:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:39:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:39:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:39:54 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 11:39:54 - OpenVPN > open_tun . 2023.09.05 11:39:54 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 11:39:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.11.82.238 255.255.255.0 . 2023.09.05 11:39:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 11:39:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 11:39:55 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:39:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:752::10ec/128 store=active . 2023.09.05 11:39:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:752::/64 -> fde6:7a:7d20:752::10ec metric 0) dev Eddie . 2023.09.05 11:39:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:752::/64 28 fe80::8 store=active . 2023.09.05 11:39:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 11:39:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 11:39:55 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:39:55 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:39:55 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 11:39:55 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 11:39:55 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:39:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.11.82.1) . 2023.09.05 11:39:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:752::1) . 2023.09.05 11:39:55 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.11.82.1) . 2023.09.05 11:39:55 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:752::1) . 2023.09.05 11:39:55 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.11.82.1) . 2023.09.05 11:39:55 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:752::1) . 2023.09.05 11:39:55 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:55 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:56 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:56 - Routes, add 185.156.175.51/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:56 - Routes, add 2001:ac8:28:5:6fae:73b:958e:2b90/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:39:56 - Flushing DNS I 2023.09.05 11:39:56 - Checking route IPv4 . 2023.09.05 11:40:23 - Checking route (4° try) . 2023.09.05 11:40:48 - Checking route (5° try) ! 2023.09.05 11:41:09 - Disconnecting . 2023.09.05 11:41:09 - Sending soft termination signal . 2023.09.05 11:41:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:41:14 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:41:14 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:752::/64) . 2023.09.05 11:41:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:752::/64 28 fe80::8 store=active . 2023.09.05 11:41:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:752::10ec store=active . 2023.09.05 11:41:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.11.82.238 store=active . 2023.09.05 11:41:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:41:14 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:14 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:14 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:15 - Routes, delete 185.156.175.53/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:41:15 - Routes, delete 185.156.175.51/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:15 - Routes, delete 2001:ac8:28:5:6fae:73b:958e:2b90/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:41:15 - Routes, delete 185.156.175.53/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:41:15 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:41:15 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:41:15 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:41:15 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:41:15 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:41:15 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:41:15 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:41:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:41:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:41:15 - Connection terminated. I 2023.09.05 11:41:15 - Cancel requested. ! 2023.09.05 11:41:15 - Session terminated. I 2023.09.05 11:42:17 - Session starting. I 2023.09.05 11:42:17 - Checking authorization ... . 2023.09.05 11:42:18 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 11:42:18 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 11:42:18 - Connecting to Sirrah (Switzerland, Zurich) . 2023.09.05 11:42:18 - Routes, add 185.156.175.61/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:42:18 - Routes, add 185.156.175.61/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 11:42:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 11:42:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 11:42:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 11:42:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:42:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:42:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 11:42:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 11:42:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.61:443 . 2023.09.05 11:42:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 11:42:18 - OpenVPN > UDP link local: (not bound) . 2023.09.05 11:42:18 - OpenVPN > UDP link remote: [AF_INET]185.156.175.61:443 . 2023.09.05 11:42:18 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.61:443, sid=3fb6e23b 17357e6e . 2023.09.05 11:42:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 11:42:18 - OpenVPN > VERIFY KU OK . 2023.09.05 11:42:18 - OpenVPN > Validating certificate extended key usage . 2023.09.05 11:42:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 11:42:18 - OpenVPN > VERIFY EKU OK . 2023.09.05 11:42:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org . 2023.09.05 11:42:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 11:42:19 - OpenVPN > [Sirrah] Peer Connection Initiated with [AF_INET]185.156.175.61:443 . 2023.09.05 11:42:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.82.1,dhcp-option DNS6 fde6:7a:7d20:1a52::1,tun-ipv6,route-gateway 10.30.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a52::10a7/64 fde6:7a:7d20:1a52::1,ifconfig 10.30.82.169 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.09.05 11:42:19 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 11:42:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.82.1' . 2023.09.05 11:42:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a52::1' . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 11:42:19 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 11:42:19 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 11:42:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:42:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 11:42:19 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 11:42:19 - OpenVPN > open_tun . 2023.09.05 11:42:19 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 11:42:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.30.82.169 255.255.255.0 . 2023.09.05 11:42:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 11:42:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 11:42:19 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:42:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1a52::10a7/128 store=active . 2023.09.05 11:42:19 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1a52::/64 -> fde6:7a:7d20:1a52::10a7 metric 0) dev Eddie . 2023.09.05 11:42:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1a52::/64 28 fe80::8 store=active . 2023.09.05 11:42:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 11:42:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 11:42:19 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 11:42:19 - OpenVPN > Initialization Sequence Completed . 2023.09.05 11:42:19 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 11:42:19 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 11:42:19 - DNS leak protection with packet filtering enabled. . 2023.09.05 11:42:19 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.30.82.1) . 2023.09.05 11:42:19 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1a52::1) . 2023.09.05 11:42:19 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.30.82.1) . 2023.09.05 11:42:19 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1a52::1) . 2023.09.05 11:42:20 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.30.82.1) . 2023.09.05 11:42:20 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1a52::1) . 2023.09.05 11:42:20 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Routes, add 185.156.175.60/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Routes, add 2001:ac8:28:7:c594:ef6c:6ed5:1742/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:20 - Flushing DNS I 2023.09.05 11:42:20 - Checking route IPv4 ! 2023.09.05 11:42:45 - Disconnecting . 2023.09.05 11:42:45 - Sending soft termination signal . 2023.09.05 11:42:48 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 11:42:49 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 11:42:49 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1a52::/64) . 2023.09.05 11:42:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1a52::/64 28 fe80::8 store=active . 2023.09.05 11:42:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1a52::10a7 store=active . 2023.09.05 11:42:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.30.82.169 store=active . 2023.09.05 11:42:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 11:42:49 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:49 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:49 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:49 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:50 - Routes, delete 185.156.175.61/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 11:42:50 - Routes, delete 185.156.175.60/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:50 - Routes, delete 2001:ac8:28:7:c594:ef6c:6ed5:1742/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 11:42:50 - Routes, delete 185.156.175.61/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 11:42:50 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:42:50 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 11:42:50 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:42:50 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 11:42:50 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:42:50 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 11:42:50 - DNS leak protection with packet filtering disabled. . 2023.09.05 11:42:50 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 11:42:50 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 11:42:50 - Connection terminated. I 2023.09.05 11:42:50 - Cancel requested. ! 2023.09.05 11:42:50 - Session terminated. . 2023.09.05 12:09:09 - Collect information about AirVPN completed . 2023.09.05 12:39:10 - Collect information about AirVPN completed . 2023.09.05 13:09:12 - Collect information about AirVPN completed . 2023.09.05 16:29:44 - Above log line repeated 6 times more I 2023.09.05 16:29:44 - Session starting. I 2023.09.05 16:29:44 - Checking authorization ... . 2023.09.05 16:29:45 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 16:29:46 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 16:29:46 - Connecting to Kitalpha (Switzerland, Zurich) . 2023.09.05 16:29:46 - Routes, add 91.214.169.71/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:29:46 - Routes, add 91.214.169.71/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 16:29:46 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 16:29:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 16:29:46 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 16:29:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:29:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:29:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:29:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:29:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.214.169.71:443 . 2023.09.05 16:29:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 16:29:46 - OpenVPN > UDP link local: (not bound) . 2023.09.05 16:29:46 - OpenVPN > UDP link remote: [AF_INET]91.214.169.71:443 . 2023.09.05 16:29:46 - OpenVPN > TLS: Initial packet from [AF_INET]91.214.169.71:443, sid=ebcfb1b1 80cd3e20 . 2023.09.05 16:29:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 16:29:47 - OpenVPN > VERIFY KU OK . 2023.09.05 16:29:47 - OpenVPN > Validating certificate extended key usage . 2023.09.05 16:29:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 16:29:47 - OpenVPN > VERIFY EKU OK . 2023.09.05 16:29:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2023.09.05 16:29:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 16:29:47 - OpenVPN > [Kitalpha] Peer Connection Initiated with [AF_INET]91.214.169.71:443 . 2023.09.05 16:29:47 - OpenVPN > SENT CONTROL [Kitalpha]: 'PUSH_REQUEST' (status=1) . 2023.09.05 16:29:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.2.1,dhcp-option DNS6 fde6:7a:7d20:1002::1,tun-ipv6,route-gateway 10.20.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1002::10a6/64 fde6:7a:7d20:1002::1,ifconfig 10.20.2.168 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2023.09.05 16:29:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 16:29:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.2.1' . 2023.09.05 16:29:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1002::1' . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 16:29:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 16:29:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 16:29:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:29:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:29:47 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 16:29:47 - OpenVPN > open_tun . 2023.09.05 16:29:47 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 16:29:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.20.2.168 255.255.255.0 . 2023.09.05 16:29:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 16:29:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 16:29:47 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:29:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1002::10a6/128 store=active . 2023.09.05 16:29:47 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1002::/64 -> fde6:7a:7d20:1002::10a6 metric 0) dev Eddie . 2023.09.05 16:29:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1002::/64 28 fe80::8 store=active . 2023.09.05 16:29:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 16:29:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 16:29:47 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:29:47 - OpenVPN > Initialization Sequence Completed . 2023.09.05 16:29:47 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 16:29:47 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 16:29:47 - DNS leak protection with packet filtering enabled. . 2023.09.05 16:29:48 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.20.2.1) . 2023.09.05 16:29:48 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1002::1) . 2023.09.05 16:29:48 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.2.1) . 2023.09.05 16:29:48 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1002::1) . 2023.09.05 16:29:48 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.20.2.1) . 2023.09.05 16:29:48 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1002::1) . 2023.09.05 16:29:48 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:48 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:48 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:48 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:48 - Routes, add 91.214.169.69/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:49 - Routes, add 2a02:aa08:e000:4500:89a3:1e11:a7ce:c45d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:29:49 - Flushing DNS I 2023.09.05 16:29:49 - Checking route IPv4 ! 2023.09.05 16:30:13 - Disconnecting . 2023.09.05 16:30:13 - Sending soft termination signal . 2023.09.05 16:30:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 16:30:17 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 16:30:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1002::/64) . 2023.09.05 16:30:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1002::/64 28 fe80::8 store=active . 2023.09.05 16:30:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1002::10a6 store=active . 2023.09.05 16:30:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.20.2.168 store=active . 2023.09.05 16:30:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 16:30:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:17 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:17 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:18 - Routes, delete 91.214.169.71/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:30:18 - Routes, delete 91.214.169.69/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:18 - Routes, delete 2a02:aa08:e000:4500:89a3:1e11:a7ce:c45d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:30:18 - Routes, delete 91.214.169.71/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 16:30:18 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:30:18 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:30:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:30:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:30:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:30:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:30:18 - DNS leak protection with packet filtering disabled. . 2023.09.05 16:30:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 16:30:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 16:30:18 - Connection terminated. I 2023.09.05 16:30:18 - Cancel requested. ! 2023.09.05 16:30:18 - Session terminated. I 2023.09.05 16:31:04 - Session starting. I 2023.09.05 16:31:04 - Checking authorization ... . 2023.09.05 16:31:05 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 16:31:05 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 16:31:05 - Connecting to Alphecca (Netherlands, Alblasserdam) . 2023.09.05 16:31:05 - Routes, add 213.152.187.197/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:31:05 - Routes, add 213.152.187.197/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 16:31:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 16:31:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 16:31:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 16:31:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:31:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:31:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:31:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:31:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.197:443 . 2023.09.05 16:31:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 16:31:05 - OpenVPN > UDP link local: (not bound) . 2023.09.05 16:31:05 - OpenVPN > UDP link remote: [AF_INET]213.152.187.197:443 . 2023.09.05 16:31:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.197:443, sid=a33880fe 409c5f39 . 2023.09.05 16:31:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 16:31:05 - OpenVPN > VERIFY KU OK . 2023.09.05 16:31:05 - OpenVPN > Validating certificate extended key usage . 2023.09.05 16:31:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 16:31:05 - OpenVPN > VERIFY EKU OK . 2023.09.05 16:31:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphecca, emailAddress=info@airvpn.org . 2023.09.05 16:31:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 16:31:06 - OpenVPN > [Alphecca] Peer Connection Initiated with [AF_INET]213.152.187.197:443 . 2023.09.05 16:31:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.82.1,dhcp-option DNS6 fde6:7a:7d20:352::1,tun-ipv6,route-gateway 10.7.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:352::105e/64 fde6:7a:7d20:352::1,ifconfig 10.7.82.96 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2023.09.05 16:31:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 16:31:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.82.1' . 2023.09.05 16:31:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:352::1' . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 16:31:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 16:31:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 16:31:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:31:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:31:06 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 16:31:06 - OpenVPN > open_tun . 2023.09.05 16:31:06 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 16:31:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.7.82.96 255.255.255.0 . 2023.09.05 16:31:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 16:31:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 16:31:06 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:31:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:352::105e/128 store=active . 2023.09.05 16:31:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:352::/64 -> fde6:7a:7d20:352::105e metric 0) dev Eddie . 2023.09.05 16:31:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:352::/64 28 fe80::8 store=active . 2023.09.05 16:31:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 16:31:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 16:31:06 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:31:06 - OpenVPN > Initialization Sequence Completed . 2023.09.05 16:31:06 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 16:31:06 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 16:31:06 - DNS leak protection with packet filtering enabled. . 2023.09.05 16:31:06 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.7.82.1) . 2023.09.05 16:31:06 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:352::1) . 2023.09.05 16:31:06 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.7.82.1) . 2023.09.05 16:31:06 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:352::1) . 2023.09.05 16:31:06 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.7.82.1) . 2023.09.05 16:31:06 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:352::1) . 2023.09.05 16:31:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Routes, add 213.152.187.195/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Routes, add 2a00:1678:1337:7a18:c5ea:bbd3:f07f:e29/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:31:07 - Flushing DNS I 2023.09.05 16:31:07 - Checking route IPv4 . 2023.09.05 16:31:34 - Checking route (4° try) ! 2023.09.05 16:31:55 - Disconnecting . 2023.09.05 16:31:55 - Sending soft termination signal . 2023.09.05 16:31:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 16:32:00 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 16:32:00 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:352::/64) . 2023.09.05 16:32:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:352::/64 28 fe80::8 store=active . 2023.09.05 16:32:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:352::105e store=active . 2023.09.05 16:32:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.7.82.96 store=active . 2023.09.05 16:32:00 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 16:32:01 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete 213.152.187.197/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:32:01 - Routes, delete 213.152.187.195/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete 2a00:1678:1337:7a18:c5ea:bbd3:f07f:e29/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:32:01 - Routes, delete 213.152.187.197/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 16:32:01 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:32:01 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:32:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:32:01 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:32:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:32:02 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:32:02 - DNS leak protection with packet filtering disabled. . 2023.09.05 16:32:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 16:32:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 16:32:02 - Connection terminated. I 2023.09.05 16:32:02 - Cancel requested. ! 2023.09.05 16:32:02 - Session terminated. . 2023.09.05 16:39:35 - Collect information about AirVPN completed I 2023.09.05 16:56:56 - Session starting. I 2023.09.05 16:56:56 - Checking authorization ... . 2023.09.05 16:56:57 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 16:56:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 16:56:57 - Connecting to Talitha (Netherlands, Alblasserdam) . 2023.09.05 16:56:57 - Routes, add 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:56:57 - Routes, add 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 16:56:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 16:56:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 16:56:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 16:56:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:56:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:56:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 16:56:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 16:56:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 16:56:57 - OpenVPN > UDP link local: (not bound) . 2023.09.05 16:56:57 - OpenVPN > UDP link remote: [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.140:443, sid=fbc08c94 fb5570a0 . 2023.09.05 16:56:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.05 16:56:57 - OpenVPN > VERIFY KU OK . 2023.09.05 16:56:57 - OpenVPN > Validating certificate extended key usage . 2023.09.05 16:56:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.05 16:56:57 - OpenVPN > VERIFY EKU OK . 2023.09.05 16:56:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2023.09.05 16:56:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.05 16:56:57 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.140:443 . 2023.09.05 16:56:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.18.1,dhcp-option DNS6 fde6:7a:7d20:1b12::1,tun-ipv6,route-gateway 10.31.18.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b12::1061/64 fde6:7a:7d20:1b12::1,ifconfig 10.31.18.99 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.18.1' . 2023.09.05 16:56:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b12::1' . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.05 16:56:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.05 16:56:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.05 16:56:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:56:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.05 16:56:58 - OpenVPN > interactive service msg_channel=0 . 2023.09.05 16:56:58 - OpenVPN > open_tun . 2023.09.05 16:56:58 - OpenVPN > wintun device [Eddie] opened . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 28 static 10.31.18.99 255.255.255.0 . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 28 all . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 28 all . 2023.09.05 16:56:58 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:1b12::1061/128 store=active . 2023.09.05 16:56:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b12::/64 -> fde6:7a:7d20:1b12::1061 metric 0) dev Eddie . 2023.09.05 16:56:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b12::/64 28 fe80::8 store=active . 2023.09.05 16:56:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.09.05 16:56:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.05 16:56:58 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.05 16:56:58 - OpenVPN > Initialization Sequence Completed . 2023.09.05 16:56:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.05 16:56:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.05 16:56:58 - DNS leak protection with packet filtering enabled. . 2023.09.05 16:56:58 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.31.18.1) . 2023.09.05 16:56:58 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:58 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.31.18.1) . 2023.09.05 16:56:59 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:59 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.31.18.1) . 2023.09.05 16:56:59 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1b12::1) . 2023.09.05 16:56:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 213.152.161.138/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Routes, add 2a00:1678:2470:6:6f0d:8828:9fc4:bbdd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:56:59 - Flushing DNS I 2023.09.05 16:56:59 - Checking route IPv4 . 2023.09.05 16:57:26 - Checking route (4° try) . 2023.09.05 16:57:52 - Checking route (5° try) E 2023.09.05 16:58:13 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2023.09.05 16:58:13 - Disconnecting . 2023.09.05 16:58:13 - Sending soft termination signal . 2023.09.05 16:58:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.05 16:58:17 - OpenVPN > Closing TUN/TAP interface . 2023.09.05 16:58:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1b12::/64) . 2023.09.05 16:58:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1b12::/64 28 fe80::8 store=active . 2023.09.05 16:58:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:1b12::1061 store=active . 2023.09.05 16:58:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 28 10.31.18.99 store=active . 2023.09.05 16:58:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.05 16:58:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:17 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.138/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 2a00:1678:2470:6:6f0d:8828:9fc4:bbdd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.09.05 16:58:18 - Routes, delete 213.152.161.140/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.05 16:58:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:58:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.09.05 16:58:18 - DNS leak protection with packet filtering disabled. . 2023.09.05 16:58:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.05 16:58:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.05 16:58:18 - Connection terminated. I 2023.09.05 16:58:19 - Cancel requested. ! 2023.09.05 16:58:19 - Session terminated. . 2023.09.05 17:09:35 - Collect information about AirVPN completed . 2023.09.05 17:39:36 - Collect information about AirVPN completed . 2023.09.05 18:09:38 - Collect information about AirVPN completed . 2023.09.05 19:35:01 - Above log line repeated 2 times more I 2023.09.05 19:35:01 - Session starting. I 2023.09.05 19:35:01 - Checking authorization ... . 2023.09.05 19:35:02 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.05 19:35:02 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 19:35:02 - Connecting to Jabbah (Netherlands, Alblasserdam) . 2023.09.05 19:35:02 - Routes, add 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 19:35:03 - Routes, add 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 19:35:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 19:35:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 19:35:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 19:35:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 19:35:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 19:35:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 19:35:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 19:35:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.26:443 . 2023.09.05 19:35:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 19:35:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.186.26:443 [nonblock] . 2023.09.05 19:37:04 - OpenVPN > TCP: connect to [AF_INET]213.152.186.26:443 failed: Unknown error . 2023.09.05 19:37:04 - OpenVPN > SIGUSR1[connection failed(soft),init_instance] received, process restarting . 2023.09.05 19:37:04 - OpenVPN > Restart pause, 5 second(s) ! 2023.09.05 19:37:04 - Disconnecting . 2023.09.05 19:37:04 - Sending soft termination signal . 2023.09.05 19:37:09 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.09.05 19:37:09 - Routes, delete 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 19:37:09 - Routes, delete 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 19:37:09 - Connection terminated. I 2023.09.05 19:37:12 - Checking authorization ... . 2023.09.05 19:37:12 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.09.05 19:37:12 - Connecting to Orion (Netherlands, Alblasserdam) . 2023.09.05 19:37:13 - Routes, add 213.152.161.241/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 19:37:13 - Routes, add 213.152.161.241/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", already exists. . 2023.09.05 19:37:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.05 19:37:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.05 19:37:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.05 19:37:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 19:37:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 19:37:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.05 19:37:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.05 19:37:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.241:443 . 2023.09.05 19:37:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.05 19:37:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.241:443 [nonblock] ! 2023.09.05 19:37:15 - Disconnecting . 2023.09.05 19:37:15 - Sending soft termination signal . 2023.09.05 19:37:18 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.09.05 19:37:18 - Routes, delete 213.152.161.241/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)". . 2023.09.05 19:37:18 - Routes, delete 213.152.161.241/32 for interface "Ethernet (Realtek PCIe GBE Family Controller)", not exists. . 2023.09.05 19:37:18 - Connection terminated. I 2023.09.05 19:37:18 - Cancel requested. ! 2023.09.05 19:37:19 - Session terminated. . 2023.09.05 19:39:40 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface_index": 7, "metric": 0, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "0.0.0.0\/0", "gateway": "0.0.0.0", "interface_index": 28, "metric": 0, "interface": "{CC4565B6-C13A-49E7-3B84-1A0381BD8BD7}" }, { "destination": "10.0.0.39\/32", "gateway": "0.0.0.0", "interface_index": 28, "metric": 256, "interface": "{CC4565B6-C13A-49E7-3B84-1A0381BD8BD7}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "192.168.0.0\/24", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "192.168.0.104\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "192.168.0.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "192.168.56.0\/24", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "192.168.56.1\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "192.168.56.255\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "::\/0", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "2001::\/32", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "2001:0:284a:364:3c83:16ab:5ba3:1c58\/128", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::1c97:18db:b439:64d\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "fe80::3c83:16ab:5ba3:1c58\/128", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::3d1f:ccf8:7b22:14a\/128", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}", "ipv6-default-gateway": "::", "ipv6-default-interface": "{93123211-9629-4E04-82F0-EA2E4F221468}", "interfaces": [ { "friendly": "dj", "id": "{CC4565B6-C13A-49E7-3B84-1A0381BD8BD7}", "name": "dj", "description": "WireGuard Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "4794293348", "bytes_sent": "79029404", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.0.0.39" ], "bind": true, "dns4": "8.8.8.8", "dns6": null }, { "friendly": "Ethernet", "id": "{3DF59734-ED3D-4B6D-B544-9E6E9DC049C9}", "name": "Ethernet", "description": "Realtek PCIe GBE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "15726454405", "bytes_sent": "2198278745", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::1c97:18db:b439:64d", "192.168.0.104" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 2", "id": "{57F96E7E-DC3D-4D1F-9404-E61D0F63BD92}", "name": "Ethernet 2", "description": "VirtualBox Host-Only Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::3d1f:ccf8:7b22:14a", "192.168.56.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{6BB4F047-2706-11E5-9BBE-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Teredo Tunneling Pseudo-Interface", "id": "{93123211-9629-4E04-82F0-EA2E4F221468}", "name": "Teredo Tunneling Pseudo-Interface", "description": "Microsoft Teredo Tunneling Adapter", "type": "Tunnel", "status": "Up", "bytes_received": "456", "bytes_sent": "51761", "support_ipv4": false, "support_ipv6": true, "ips": [ "2001:0:284a:364:3c83:16ab:5ba3:1c58", "fe80::3c83:16ab:5ba3:1c58" ], "bind": true, "dns4": null, "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-85GBIH7 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter dj: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : WireGuard Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 10.0.0.39(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.255 Default Gateway . . . . . . . . . : 0.0.0.0 DNS Servers . . . . . . . . . . . : 8.8.8.8 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : A8-A1-59-27-8A-E4 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::1c97:18db:b439:64d%7(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.104(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Monday, September 4, 2023 2:25:47 PM Lease Expires . . . . . . . . . . : Tuesday, September 5, 2023 9:31:09 PM Default Gateway . . . . . . . . . : 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 61383001 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-FB-FF-BC-A8-A1-59-27-8A-E4 DNS Servers . . . . . . . . . . . : 192.168.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter Physical Address. . . . . . . . . : 0A-00-27-00-00-08 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::3d1f:ccf8:7b22:14a%8(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.56.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 185204775 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-FB-FF-BC-A8-A1-59-27-8A-E4 DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . . : Enabled Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2001:0:284a:364:3c83:16ab:5ba3:1c58(Preferred) Link-local IPv6 Address . . . . . : fe80::3c83:16ab:5ba3:1c58%12(Preferred) Default Gateway . . . . . . . . . : :: DHCPv6 IAID . . . . . . . . . . . : 201326592 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-FB-FF-BC-A8-A1-59-27-8A-E4 NetBIOS over Tcpip. . . . . . . . : Disabled