. 2023.10.11 18:34:54 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.10.11 18:34:54 - Command line arguments (1): path="home" . 2023.10.11 18:34:55 - Reading options from C:\Users\alido\AppData\Local\Eddie\default.profile . 2023.10.11 18:34:56 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.10.11 18:34:56 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.10.11 18:34:56 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.10.11 18:34:57 - Ready . 2023.10.11 18:34:57 - Collect information about AirVPN completed . 2023.10.11 18:35:01 - Collect information about AirVPN completed I 2023.10.11 18:35:08 - Session starting. I 2023.10.11 18:35:09 - Checking authorization ... W 2023.10.11 18:35:10 - Deprecated: please uncheck Preferences > Advanced > Force usage of old Tap driver . 2023.10.11 18:35:10 - Using Tap0901 network interface "Local Area Connection (TAP-Windows Adapter V9)" ! 2023.10.11 18:35:10 - Connecting to Luhman (Netherlands, Alblasserdam) . 2023.10.11 18:35:10 - Routes, add 213.152.186.170/32 for interface "Ethernet (Realtek Gaming GbE Family Controller)". . 2023.10.11 18:35:11 - Routes, add 213.152.186.170/32 for interface "Ethernet (Realtek Gaming GbE Family Controller)", already exists. . 2023.10.11 18:35:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.11 18:35:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.11 18:35:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.11 18:35:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.11 18:35:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.11 18:35:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.11 18:35:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.11 18:35:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.170:443 . 2023.10.11 18:35:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.11 18:35:11 - OpenVPN > UDP link local: (not bound) . 2023.10.11 18:35:11 - OpenVPN > UDP link remote: [AF_INET]213.152.186.170:443 . 2023.10.11 18:35:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.170:443, sid=ec9dd6e4 51f3bc20 . 2023.10.11 18:35:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.11 18:35:11 - OpenVPN > VERIFY KU OK . 2023.10.11 18:35:11 - OpenVPN > Validating certificate extended key usage . 2023.10.11 18:35:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.11 18:35:11 - OpenVPN > VERIFY EKU OK . 2023.10.11 18:35:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2023.10.11 18:35:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.11 18:35:11 - OpenVPN > [Luhman] Peer Connection Initiated with [AF_INET]213.152.186.170:443 . 2023.10.11 18:35:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.218.1,dhcp-option DNS6 fde6:7a:7d20:1eda::1,tun-ipv6,route-gateway 10.34.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1eda::1002/64 fde6:7a:7d20:1eda::1,ifconfig 10.34.218.4 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.10.11 18:35:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.11 18:35:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.218.1' . 2023.10.11 18:35:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1eda::1' . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.10.11 18:35:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.11 18:35:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.11 18:35:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.11 18:35:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.11 18:35:11 - OpenVPN > interactive service msg_channel=0 . 2023.10.11 18:35:11 - OpenVPN > open_tun . 2023.10.11 18:35:11 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2023.10.11 18:35:12 - OpenVPN > TAP-Windows Driver Version 9.24 . 2023.10.11 18:35:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.34.218.0/10.34.218.4/255.255.255.0 [SUCCEEDED] . 2023.10.11 18:35:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.34.218.4/255.255.255.0 on interface {78E5F386-3368-46E0-B86D-5D5463F0354E} [DHCP-serv: 10.34.218.0, lease-time: 31536000] . 2023.10.11 18:35:12 - OpenVPN > Successful ARP Flush on interface [15] {78E5F386-3368-46E0-B86D-5D5463F0354E} . 2023.10.11 18:35:12 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.10.11 18:35:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 15 fde6:7a:7d20:1eda::1002/128 store=active . 2023.10.11 18:35:12 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1eda::/64 -> fde6:7a:7d20:1eda::1002 metric 0) dev Local Area Connection . 2023.10.11 18:35:12 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1eda::/64 15 fe80::8 store=active . 2023.10.11 18:35:12 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.10.11 18:35:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 15 all . 2023.10.11 18:35:12 - OpenVPN > IPv6 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2023.10.11 18:35:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up . 2023.10.11 18:35:17 - OpenVPN > Initialization Sequence Completed . 2023.10.11 18:35:18 - Interface Local Area Connection metric changed from 6 to 3, layer IPv4 . 2023.10.11 18:35:18 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2023.10.11 18:35:18 - DNS leak protection with packet filtering enabled. . 2023.10.11 18:35:18 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.34.218.1) . 2023.10.11 18:35:18 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:1eda::1) . 2023.10.11 18:35:18 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.34.218.1) . 2023.10.11 18:35:18 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1eda::1) . 2023.10.11 18:35:19 - DNS IPv4 of a network adapter forced (vEthernet (Default Switch), from automatic to 10.34.218.1) . 2023.10.11 18:35:19 - DNS IPv6 of a network adapter forced (vEthernet (Default Switch), from automatic to fde6:7a:7d20:1eda::1) . 2023.10.11 18:35:19 - Routes, add 0.0.0.0/1 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:20 - Routes, add 128.0.0.0/1 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:20 - Routes, add ::/1 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:21 - Routes, add 8000::/1 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:21 - Routes, add 213.152.186.168/32 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:22 - Routes, add 2a00:1678:1337:2429:4c19:55f8:dbef:d67e/128 for interface "Local Area Connection (TAP-Windows Adapter V9)". . 2023.10.11 18:35:22 - Flushing DNS I 2023.10.11 18:35:22 - Checking route IPv4 . 2023.10.11 18:36:04 - Checking route (4° try) . 2023.10.11 18:36:08 - Checking route (5° try) E 2023.10.11 18:36:09 - Checking route IPv4 failed, last reason: Fetch url error:SSL peer certificate or SSH remote key was not OK ! 2023.10.11 18:36:09 - Disconnecting . 2023.10.11 18:36:09 - Sending soft termination signal . 2023.10.11 18:36:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.10.11 18:36:14 - OpenVPN > Closing TUN/TAP interface . 2023.10.11 18:36:14 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1eda::/64) . 2023.10.11 18:36:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1eda::/64 15 fe80::8 store=active . 2023.10.11 18:36:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 15 fde6:7a:7d20:1eda::1002 store=active . 2023.10.11 18:36:15 - OpenVPN > TAP: DHCP address released . 2023.10.11 18:36:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.10.11 18:36:15 - Elevated: Command:route-list