Eddie System/Environment Report - 10.09.2023 - 15:09 UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Program Files\AirVPN\default.profile Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: fde6:7a:7d20:46::1, 10.4.70.1 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: Failed Test Ping IPv6: Failed Test HTTP IPv4: Error: Fetch url error:Timeout was reached Test HTTP IPv6: Error: Fetch url error:Timeout was reached Test HTTPS: Error: Fetch url error:Couldn't resolve host name ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) ---------------------------- Logs: . 2023.09.10 18:06:22 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2023.09.10 18:06:23 - Reading options from C:\Program Files\AirVPN\default.profile . 2023.09.10 18:06:25 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.09.10 18:06:25 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.09.10 18:06:25 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.09.10 18:06:25 - Ready . 2023.09.10 18:06:26 - Collect information about AirVPN completed I 2023.09.10 18:06:28 - Session starting. I 2023.09.10 18:06:28 - Checking authorization ... . 2023.09.10 18:06:29 - Added new network interface "Eddie", Wintun version 0.12 . 2023.09.10 18:06:29 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.09.10 18:06:29 - Connecting to Acamar (United States of America, Miami) . 2023.09.10 18:06:30 - Routes, add 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.10 18:06:30 - Routes, add 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.09.10 18:06:30 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.10 18:06:30 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.10 18:06:30 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.10 18:06:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.10 18:06:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.10 18:06:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.10 18:06:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.10 18:06:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]173.44.55.157:443 . 2023.09.10 18:06:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.10 18:06:30 - OpenVPN > UDP link local: (not bound) . 2023.09.10 18:06:30 - OpenVPN > UDP link remote: [AF_INET]173.44.55.157:443 . 2023.09.10 18:06:30 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.157:443, sid=06f14815 f8eb1c47 . 2023.09.10 18:06:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.10 18:06:30 - OpenVPN > VERIFY KU OK . 2023.09.10 18:06:30 - OpenVPN > Validating certificate extended key usage . 2023.09.10 18:06:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.10 18:06:30 - OpenVPN > VERIFY EKU OK . 2023.09.10 18:06:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Acamar, emailAddress=info@airvpn.org . 2023.09.10 18:06:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.10 18:06:30 - OpenVPN > [Acamar] Peer Connection Initiated with [AF_INET]173.44.55.157:443 . 2023.09.10 18:06:31 - OpenVPN > SENT CONTROL [Acamar]: 'PUSH_REQUEST' (status=1) . 2023.09.10 18:06:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.70.1,dhcp-option DNS6 fde6:7a:7d20:46::1,tun-ipv6,route-gateway 10.4.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:46::1018/64 fde6:7a:7d20:46::1,ifconfig 10.4.70.26 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.09.10 18:06:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.10 18:06:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.70.1' . 2023.09.10 18:06:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:46::1' . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.10 18:06:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.10 18:06:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.10 18:06:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.10 18:06:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.10 18:06:31 - OpenVPN > interactive service msg_channel=0 . 2023.09.10 18:06:31 - OpenVPN > open_tun . 2023.09.10 18:06:31 - OpenVPN > wintun device [Eddie] opened . 2023.09.10 18:06:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 28 static 10.4.70.26 255.255.255.0 . 2023.09.10 18:06:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 28 all . 2023.09.10 18:06:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 28 all . 2023.09.10 18:06:31 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.10 18:06:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:46::1018/128 store=active . 2023.09.10 18:06:31 - OpenVPN > add_route_ipv6(fde6:7a:7d20:46::/64 -> fde6:7a:7d20:46::1018 metric 0) dev Eddie . 2023.09.10 18:06:31 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:46::/64 28 fe80::8 store=active . 2023.09.10 18:06:31 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.09.10 18:06:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.10 18:06:32 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.10 18:06:32 - OpenVPN > Initialization Sequence Completed . 2023.09.10 18:06:32 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.10 18:06:32 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.10 18:06:32 - DNS leak protection with packet filtering enabled. . 2023.09.10 18:06:32 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.4.70.1) . 2023.09.10 18:06:32 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:46::1) . 2023.09.10 18:06:32 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.4.70.1) . 2023.09.10 18:06:32 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:46::1) . 2023.09.10 18:06:32 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:32 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:33 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:33 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:33 - Routes, add 173.44.55.155/32 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:33 - Routes, add 2607:ff48:aa81:200:89bd:a0e5:6626:b661/128 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:06:33 - Flushing DNS I 2023.09.10 18:06:33 - Checking route IPv4 . 2023.09.10 18:07:00 - Checking route (4° try) . 2023.09.10 18:07:26 - Checking route (5° try) E 2023.09.10 18:07:47 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2023.09.10 18:07:47 - Disconnecting . 2023.09.10 18:07:47 - Sending soft termination signal . 2023.09.10 18:07:50 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.10 18:07:51 - OpenVPN > Closing TUN/TAP interface . 2023.09.10 18:07:51 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:46::/64) . 2023.09.10 18:07:51 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:46::/64 28 fe80::8 store=active . 2023.09.10 18:07:51 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:46::1018 store=active . 2023.09.10 18:07:51 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 28 10.4.70.26 store=active . 2023.09.10 18:07:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.10 18:07:51 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:51 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:51 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:52 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:52 - Routes, delete 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.10 18:07:52 - Routes, delete 173.44.55.155/32 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:52 - Routes, delete 2607:ff48:aa81:200:89bd:a0e5:6626:b661/128 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:52 - Routes, delete 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.09.10 18:07:52 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.10 18:07:52 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.10 18:07:52 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.10 18:07:52 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.10 18:07:52 - DNS leak protection with packet filtering disabled. . 2023.09.10 18:07:52 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.10 18:07:52 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.10 18:07:52 - Connection terminated. I 2023.09.10 18:07:55 - Checking authorization ... . 2023.09.10 18:07:56 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.09.10 18:07:56 - Connecting to Acamar (United States of America, Miami) . 2023.09.10 18:07:56 - Routes, add 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.10 18:07:56 - Routes, add 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.09.10 18:07:56 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.10 18:07:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.10 18:07:56 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.10 18:07:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.10 18:07:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.10 18:07:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.10 18:07:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.10 18:07:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]173.44.55.157:443 . 2023.09.10 18:07:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.09.10 18:07:56 - OpenVPN > UDP link local: (not bound) . 2023.09.10 18:07:56 - OpenVPN > UDP link remote: [AF_INET]173.44.55.157:443 . 2023.09.10 18:07:56 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.157:443, sid=dfc43852 c18df6ba . 2023.09.10 18:07:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.10 18:07:57 - OpenVPN > VERIFY KU OK . 2023.09.10 18:07:57 - OpenVPN > Validating certificate extended key usage . 2023.09.10 18:07:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.10 18:07:57 - OpenVPN > VERIFY EKU OK . 2023.09.10 18:07:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Acamar, emailAddress=info@airvpn.org . 2023.09.10 18:07:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.10 18:07:57 - OpenVPN > [Acamar] Peer Connection Initiated with [AF_INET]173.44.55.157:443 . 2023.09.10 18:07:58 - OpenVPN > SENT CONTROL [Acamar]: 'PUSH_REQUEST' (status=1) . 2023.09.10 18:07:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.70.1,dhcp-option DNS6 fde6:7a:7d20:46::1,tun-ipv6,route-gateway 10.4.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:46::1018/64 fde6:7a:7d20:46::1,ifconfig 10.4.70.26 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.09.10 18:07:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.10 18:07:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.70.1' . 2023.09.10 18:07:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:46::1' . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.10 18:07:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.10 18:07:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.10 18:07:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.10 18:07:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.10 18:07:58 - OpenVPN > interactive service msg_channel=0 . 2023.09.10 18:07:58 - OpenVPN > open_tun . 2023.09.10 18:07:58 - OpenVPN > wintun device [Eddie] opened . 2023.09.10 18:07:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 28 static 10.4.70.26 255.255.255.0 . 2023.09.10 18:07:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 28 all . 2023.09.10 18:07:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 28 all . 2023.09.10 18:07:58 - OpenVPN > IPv4 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.10 18:07:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 28 fde6:7a:7d20:46::1018/128 store=active . 2023.09.10 18:07:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:46::/64 -> fde6:7a:7d20:46::1018 metric 0) dev Eddie . 2023.09.10 18:07:58 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:46::/64 28 fe80::8 store=active . 2023.09.10 18:07:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.09.10 18:07:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 28 all . 2023.09.10 18:07:58 - OpenVPN > IPv6 MTU set to 1500 on interface 28 using SetIpInterfaceEntry() . 2023.09.10 18:07:58 - OpenVPN > Initialization Sequence Completed . 2023.09.10 18:07:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.09.10 18:07:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.09.10 18:07:58 - DNS leak protection with packet filtering enabled. . 2023.09.10 18:07:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.4.70.1) . 2023.09.10 18:07:59 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:46::1) . 2023.09.10 18:07:59 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.4.70.1) . 2023.09.10 18:07:59 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:46::1) . 2023.09.10 18:07:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:59 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:07:59 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:08:00 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:08:00 - Routes, add 173.44.55.155/32 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:08:00 - Routes, add 2607:ff48:aa81:200:89bd:a0e5:6626:b661/128 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:08:00 - Flushing DNS I 2023.09.10 18:08:00 - Checking route IPv4 . 2023.09.10 18:08:27 - Checking route (4° try) . 2023.09.10 18:08:52 - Checking route (5° try) E 2023.09.10 18:09:13 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached ! 2023.09.10 18:09:13 - Disconnecting . 2023.09.10 18:09:13 - Sending soft termination signal . 2023.09.10 18:09:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.10 18:09:18 - OpenVPN > Closing TUN/TAP interface . 2023.09.10 18:09:18 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:46::/64) . 2023.09.10 18:09:18 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:46::/64 28 fe80::8 store=active . 2023.09.10 18:09:18 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 28 fde6:7a:7d20:46::1018 store=active . 2023.09.10 18:09:18 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 28 10.4.70.26 store=active . 2023.09.10 18:09:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.09.10 18:09:18 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.10 18:09:19 - Routes, delete 173.44.55.155/32 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete 2607:ff48:aa81:200:89bd:a0e5:6626:b661/128 for interface "Eddie (Eddie Tunnel)". . 2023.09.10 18:09:19 - Routes, delete 173.44.55.157/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.09.10 18:09:19 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.10 18:09:19 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.09.10 18:09:19 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.10 18:09:20 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.09.10 18:09:20 - DNS leak protection with packet filtering disabled. . 2023.09.10 18:09:20 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.09.10 18:09:20 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.09.10 18:09:20 - Connection terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.3.1", "interface_index": 4, "metric": 0, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "192.168.3.0\/24", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "192.168.3.2\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "192.168.3.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 28, "metric": 256, "interface": "{E06233A5-01F3-45BA-BF50-12A5D2733128}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 28, "metric": 256, "interface": "{E06233A5-01F3-45BA-BF50-12A5D2733128}" }, { "destination": "fe80::c7dd:e1f6:5c24:f1ba\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "fe80::d2ea:7806:8f23:e9d8\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}" }, { "destination": "fe80::dcde:7773:d853:d766\/128", "gateway": "::", "interface_index": 28, "metric": 256, "interface": "{E06233A5-01F3-45BA-BF50-12A5D2733128}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 28, "metric": 256, "interface": "{E06233A5-01F3-45BA-BF50-12A5D2733128}" } ], "ipv4-default-gateway": "192.168.3.1", "ipv4-default-interface": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}", "interfaces": [ { "friendly": "Eddie", "id": "{E06233A5-01F3-45BA-BF50-12A5D2733128}", "name": "Eddie", "description": "Eddie Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "124669", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::dcde:7773:d853:d766" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{1D9C254E-5205-452F-9F41-DF7BE92ACEAD}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "73511981", "bytes_sent": "51417532", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::c7dd:e1f6:5c24:f1ba", "192.168.3.2" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u041f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043f\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438", "id": "{6AC1D071-3AAD-4B9F-B5B6-893B55E7DC67}", "name": "\u041f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043f\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d2ea:7806:8f23:e9d8", "169.254.111.213" ], "bind": true, "dns4": "8.8.8.8,8.8.4.4", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{8DBD7A2D-FF23-11ED-913F-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": null, "dns6": null } ] } ---------------------------- ipconfig /all: Ќ бва®©Є  Їа®в®Є®«  IP ¤«п Windows €¬п Є®¬ЇмовҐа  . . . . . . . . . : DESKTOP-DDR7FRQ Ћб­®ў­®© DNS-бгддЁЄб . . . . . . : ’ЁЇ 㧫 . . . . . . . . . . . . . : ѓЁЎаЁ¤­л© IP-¬ аиагвЁ§ жЁп ўЄ«о祭  . . . . : ЌҐв WINS-Їа®ЄбЁ ўЄ«о祭 . . . . . . . : ЌҐв ЌҐЁ§ўҐбв­л©  ¤ ЇвҐа Eddie: ‘®бв®п­ЁҐ б।л. . . . . . . . : ‘।  ЇҐаҐ¤ зЁ ­Ґ¤®бвгЇ­ . DNS-бгддЁЄб Ї®¤Є«о祭Ёп . . . . . : ЋЇЁб ­ЁҐ. . . . . . . . . . . . . : Eddie Tunnel ”Ё§ЁзҐбЄЁ©  ¤аҐб. . . . . . . . . : DHCP ўЄ«о祭. . . . . . . . . . . : ЌҐв Ђўв®­ бва®©Є  ўЄ«о祭 . . . . . . : „  Ђ¤ ЇвҐа Ethernet Ethernet: DNS-бгддЁЄб Ї®¤Є«о祭Ёп . . . . . : ЋЇЁб ­ЁҐ. . . . . . . . . . . . . : Realtek PCIe GbE Family Controller ”Ё§ЁзҐбЄЁ©  ¤аҐб. . . . . . . . . : 90-E6-BA-17-B2-44 DHCP ўЄ«о祭. . . . . . . . . . . : „  Ђўв®­ бва®©Є  ўЄ«о祭 . . . . . . : „  ‹®Є «м­л© IPv6- ¤аҐб Є ­ «  . . . : fe80::c7dd:e1f6:5c24:f1ba%4(Ћб­®ў­®©) IPv4- ¤аҐб. . . . . . . . . . . . : 192.168.3.2(Ћб­®ў­®©) Њ бЄ  Ї®¤бҐвЁ . . . . . . . . . . : 255.255.255.0 ЂаҐ­¤  Ї®«г祭 . . . . . . . . . . : 10 ᥭвпЎап 2023 Ј. 13:32:36 ‘а®Є  аҐ­¤л Ёб⥪ Ґв. . . . . . . . . . : 11 ᥭвпЎап 2023 Ј. 14:43:43 Ћб­®ў­®© и«о§. . . . . . . . . : 192.168.3.1 DHCP-бҐаўҐа. . . . . . . . . . . : 192.168.3.1 IAID DHCPv6 . . . . . . . . . . . : 110159546 DUID Є«ЁҐ­в  DHCPv6 . . . . . . . : 00-01-00-01-2C-08-0D-9D-90-E6-BA-17-B2-44 DNS-бҐаўҐал. . . . . . . . . . . : 192.168.3.1 NetBios зҐаҐ§ TCP/IP. . . . . . . . : ‚Є«о祭 ЌҐЁ§ўҐбв­л©  ¤ ЇвҐа Џ®¤Є«о祭ЁҐ Ї® «®Є «м­®© бҐвЁ: ‘®бв®п­ЁҐ б।л. . . . . . . . : ‘।  ЇҐаҐ¤ зЁ ­Ґ¤®бвгЇ­ . DNS-бгддЁЄб Ї®¤Є«о祭Ёп . . . . . : ЋЇЁб ­ЁҐ. . . . . . . . . . . . . : TAP-Windows Adapter V9 ”Ё§ЁзҐбЄЁ©  ¤аҐб. . . . . . . . . : 00-FF-6A-C1-D0-71 DHCP ўЄ«о祭. . . . . . . . . . . : „  Ђўв®­ бва®©Є  ўЄ«о祭 . . . . . . : „