Eddie System/Environment Report - 27/10/2023 - 22:21 UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.22621.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\mijaj\AppData\Local\Eddie\default.profile Data path: C:\Users\mijaj\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 192.168.1.254 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 36 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Timeout was reached Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.denylist: 2c99a52815c8fe1d14379c250894e5375c20742afe6092eb26e297261ca46146 servers.startlast: True mode.type: openvpn mode.protocol: TCP mode.port: 22 mode.alt: 2 proxy.mode: none ---------------------------- Logs: . 2023.10.28 00:18:58 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.10.28 00:18:58 - Command line arguments (1): path="home" . 2023.10.28 00:18:58 - Raise system privileges . 2023.10.28 00:19:01 - Reading options from C:\Users\mijaj\AppData\Local\Eddie\default.profile . 2023.10.28 00:19:02 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.10.28 00:19:02 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.10.28 00:19:02 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2023.10.28 00:19:02 - Activation of Network Lock - Windows Filtering Platform I 2023.10.28 00:19:03 - Ready . 2023.10.28 00:19:04 - Collect information about AirVPN completed I 2023.10.28 00:19:04 - Session starting. I 2023.10.28 00:19:04 - Checking authorization ... . 2023.10.28 00:19:04 - Collect information about AirVPN completed . 2023.10.28 00:19:05 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:19:05 - Connecting to Miram (Netherlands, Alblasserdam) . 2023.10.28 00:19:05 - Routes, add 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:19:05 - Routes, add 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:19:05 - SSH > Looking up host "213.152.162.91" for SSH connection . 2023.10.28 00:19:05 - SSH > Connecting to 213.152.162.91 port 22 . 2023.10.28 00:19:05 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:19:05 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:19:05 - SSH > Using SSH protocol version 2 . 2023.10.28 00:19:05 - SSH > No GSSAPI security context available . 2023.10.28 00:19:06 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:19:06 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:19:06 - SSH > Host key fingerprint is: . 2023.10.28 00:19:06 - SSH > ssh-ed25519 255 7d:69:c0:fa:a3:75:54:80:f4:78:d5:a1:c8:35:1e:35 . 2023.10.28 00:19:06 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:19:06 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:19:06 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:19:06 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:19:06 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\f889a05cd1da21a6ec8e0b5e77e7b72f6bccdaed9055b5de678d6a31f05a129e.tmp.ppk" . 2023.10.28 00:19:06 - SSH > Using username "sshtunnel". . 2023.10.28 00:19:06 - SSH > Offered public key . 2023.10.28 00:19:06 - SSH > Offer of public key accepted . 2023.10.28 00:19:06 - SSH > Authenticating with public key "" . 2023.10.28 00:19:06 - SSH > Sent public key signature . 2023.10.28 00:19:06 - SSH > Access granted . 2023.10.28 00:19:06 - SSH > Local port 30918 forwarding to 127.0.0.1:2019 . 2023.10.28 00:19:06 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:19:06 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:19:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:19:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:19:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:19:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:19:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:19:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:19:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:19:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:30918 . 2023.10.28 00:19:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:19:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:30918 [nonblock] . 2023.10.28 00:19:06 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57322 . 2023.10.28 00:19:06 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:30918 . 2023.10.28 00:19:06 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:19:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:30918 ! 2023.10.28 00:19:06 - Disconnecting . 2023.10.28 00:19:06 - Sending soft termination signal . 2023.10.28 00:19:09 - Sending hard termination signal . 2023.10.28 00:19:09 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort . 2023.10.28 00:19:09 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.10.28 00:19:09 - Routes, delete 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:19:09 - Routes, delete 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:19:09 - Connection terminated. I 2023.10.28 00:19:09 - Cancel requested. ! 2023.10.28 00:19:09 - Session terminated. ! 2023.10.28 00:19:12 - Deactivation of Network Lock I 2023.10.28 00:21:20 - Session starting. I 2023.10.28 00:21:20 - Checking authorization ... . 2023.10.28 00:21:21 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:21 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.10.28 00:21:21 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:21 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:21:22 - SSH > Looking up host "213.152.161.32" for SSH connection . 2023.10.28 00:21:22 - SSH > Connecting to 213.152.161.32 port 22 . 2023.10.28 00:21:22 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:21:22 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:21:22 - SSH > Using SSH protocol version 2 . 2023.10.28 00:21:22 - SSH > No GSSAPI security context available . 2023.10.28 00:21:22 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:21:22 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:21:22 - SSH > Host key fingerprint is: . 2023.10.28 00:21:22 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:22 - SSH > The server's host key is not cached in the registry. You . 2023.10.28 00:21:22 - SSH > have no guarantee that the server is the computer you . 2023.10.28 00:21:22 - SSH > think it is. . 2023.10.28 00:21:22 - SSH > The server's ssh-ed25519 key fingerprint is: . 2023.10.28 00:21:22 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:22 - SSH > If you trust this host, enter "y" to add the key to . 2023.10.28 00:21:22 - SSH > PuTTY's cache and carry on connecting. . 2023.10.28 00:21:22 - SSH > If you want to carry on connecting just once, without . 2023.10.28 00:21:22 - SSH > adding the key to the cache, enter "n". . 2023.10.28 00:21:22 - SSH > If you do not trust this host, press Return to abandon the . 2023.10.28 00:21:22 - SSH > connection. . 2023.10.28 00:21:22 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:21:22 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:21:22 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:21:22 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:21:22 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\377967adf2b0f888b999a2a4eae4bfdd841df47b075ef37d957657dc757ac75e.tmp.ppk" . 2023.10.28 00:21:22 - SSH > Using username "sshtunnel". . 2023.10.28 00:21:22 - SSH > Offered public key . 2023.10.28 00:21:22 - SSH > Offer of public key accepted . 2023.10.28 00:21:22 - SSH > Authenticating with public key "" . 2023.10.28 00:21:22 - SSH > Sent public key signature . 2023.10.28 00:21:22 - SSH > Access granted . 2023.10.28 00:21:22 - SSH > Local port 30572 forwarding to 127.0.0.1:2019 . 2023.10.28 00:21:22 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:22 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:21:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:21:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:21:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:30572 . 2023.10.28 00:21:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:21:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:30572 [nonblock] . 2023.10.28 00:21:22 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57365 . 2023.10.28 00:21:22 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:30572 . 2023.10.28 00:21:22 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:21:22 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:30572 . 2023.10.28 00:21:22 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:30572, sid=23470093 5b81f023 . 2023.10.28 00:21:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:21:22 - OpenVPN > VERIFY KU OK . 2023.10.28 00:21:22 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:21:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:21:22 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:21:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.10.28 00:21:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:21:23 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]127.0.0.1:30572 . 2023.10.28 00:21:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.55.1,dhcp-option DNS6 fde6:7a:7d20:1237::1,tun-ipv6,route-gateway 10.22.55.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1237::10db/64 fde6:7a:7d20:1237::1,ifconfig 10.22.55.221 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.28 00:21:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 00:21:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.55.1' . 2023.10.28 00:21:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1237::1' . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.10.28 00:21:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 00:21:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 00:21:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:23 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 00:21:23 - OpenVPN > open_tun . 2023.10.28 00:21:23 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.10.28 00:21:23 - OpenVPN > Exiting due to fatal error . 2023.10.28 00:21:23 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort ! 2023.10.28 00:21:23 - Disconnecting . 2023.10.28 00:21:23 - Sending hard termination signal . 2023.10.28 00:21:23 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:23 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:21:23 - Connection terminated. I 2023.10.28 00:21:26 - Checking authorization ... . 2023.10.28 00:21:27 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:27 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.10.28 00:21:27 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:28 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:21:28 - SSH > Looking up host "213.152.161.32" for SSH connection . 2023.10.28 00:21:28 - SSH > Connecting to 213.152.161.32 port 22 . 2023.10.28 00:21:28 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:21:28 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:21:28 - SSH > Using SSH protocol version 2 . 2023.10.28 00:21:28 - SSH > No GSSAPI security context available . 2023.10.28 00:21:28 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:21:28 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:21:28 - SSH > Host key fingerprint is: . 2023.10.28 00:21:28 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:28 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:21:28 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:21:28 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:21:28 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:21:28 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\6b4b58a755c3e2e6525d2c1c77aeb283bbcd5942762d4a176825a3ed7108c586.tmp.ppk" . 2023.10.28 00:21:28 - SSH > Using username "sshtunnel". . 2023.10.28 00:21:28 - SSH > Offered public key . 2023.10.28 00:21:28 - SSH > Offer of public key accepted . 2023.10.28 00:21:28 - SSH > Authenticating with public key "" . 2023.10.28 00:21:28 - SSH > Sent public key signature . 2023.10.28 00:21:28 - SSH > Access granted . 2023.10.28 00:21:28 - SSH > Local port 60382 forwarding to 127.0.0.1:2019 . 2023.10.28 00:21:28 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:28 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:21:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:21:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:21:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:60382 . 2023.10.28 00:21:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:21:28 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:60382 [nonblock] . 2023.10.28 00:21:28 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57369 . 2023.10.28 00:21:28 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:60382 . 2023.10.28 00:21:28 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:21:28 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:60382 . 2023.10.28 00:21:28 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:60382, sid=70ccd480 f5f48220 . 2023.10.28 00:21:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:21:28 - OpenVPN > VERIFY KU OK . 2023.10.28 00:21:28 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:21:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:21:28 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:21:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.10.28 00:21:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:21:29 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]127.0.0.1:60382 . 2023.10.28 00:21:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.55.1,dhcp-option DNS6 fde6:7a:7d20:1237::1,tun-ipv6,route-gateway 10.22.55.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1237::10db/64 fde6:7a:7d20:1237::1,ifconfig 10.22.55.221 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.28 00:21:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 00:21:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.55.1' . 2023.10.28 00:21:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1237::1' . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.10.28 00:21:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 00:21:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 00:21:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:29 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 00:21:29 - OpenVPN > open_tun . 2023.10.28 00:21:29 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.10.28 00:21:29 - OpenVPN > Exiting due to fatal error . 2023.10.28 00:21:29 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort ! 2023.10.28 00:21:29 - Disconnecting . 2023.10.28 00:21:29 - Sending hard termination signal . 2023.10.28 00:21:29 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:29 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:21:29 - Connection terminated. I 2023.10.28 00:21:32 - Checking authorization ... . 2023.10.28 00:21:33 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:33 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.10.28 00:21:33 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:34 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:21:34 - SSH > Looking up host "213.152.161.32" for SSH connection . 2023.10.28 00:21:34 - SSH > Connecting to 213.152.161.32 port 22 . 2023.10.28 00:21:34 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:21:34 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:21:34 - SSH > Using SSH protocol version 2 . 2023.10.28 00:21:34 - SSH > No GSSAPI security context available . 2023.10.28 00:21:34 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:21:34 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:21:34 - SSH > Host key fingerprint is: . 2023.10.28 00:21:34 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:34 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:21:34 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:21:34 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:21:34 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:21:34 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\c99a3713c489194fd306abc33c9e2b476c889bbb8ddbda9cade9750916fb4037.tmp.ppk" . 2023.10.28 00:21:34 - SSH > Using username "sshtunnel". . 2023.10.28 00:21:34 - SSH > Offered public key . 2023.10.28 00:21:34 - SSH > Offer of public key accepted . 2023.10.28 00:21:34 - SSH > Authenticating with public key "" . 2023.10.28 00:21:34 - SSH > Sent public key signature . 2023.10.28 00:21:34 - SSH > Access granted . 2023.10.28 00:21:34 - SSH > Local port 45593 forwarding to 127.0.0.1:2019 . 2023.10.28 00:21:34 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:34 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:21:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:21:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:21:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:45593 . 2023.10.28 00:21:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:21:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:45593 [nonblock] . 2023.10.28 00:21:35 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:45593 . 2023.10.28 00:21:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:21:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:45593 . 2023.10.28 00:21:35 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57375 . 2023.10.28 00:21:35 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:45593, sid=1cbcef70 ccb71555 . 2023.10.28 00:21:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:21:35 - OpenVPN > VERIFY KU OK . 2023.10.28 00:21:35 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:21:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:21:35 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:21:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.10.28 00:21:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:21:35 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]127.0.0.1:45593 . 2023.10.28 00:21:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.55.1,dhcp-option DNS6 fde6:7a:7d20:1237::1,tun-ipv6,route-gateway 10.22.55.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1237::10db/64 fde6:7a:7d20:1237::1,ifconfig 10.22.55.221 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.28 00:21:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 00:21:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.55.1' . 2023.10.28 00:21:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1237::1' . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.10.28 00:21:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 00:21:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 00:21:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:35 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 00:21:35 - OpenVPN > open_tun . 2023.10.28 00:21:35 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.10.28 00:21:35 - OpenVPN > Exiting due to fatal error . 2023.10.28 00:21:35 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort ! 2023.10.28 00:21:35 - Disconnecting . 2023.10.28 00:21:35 - Sending hard termination signal . 2023.10.28 00:21:36 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:36 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:21:36 - Connection terminated. I 2023.10.28 00:21:39 - Checking authorization ... . 2023.10.28 00:21:40 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:40 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.10.28 00:21:40 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:41 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:21:41 - SSH > Looking up host "213.152.161.32" for SSH connection . 2023.10.28 00:21:41 - SSH > Connecting to 213.152.161.32 port 22 . 2023.10.28 00:21:41 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:21:41 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:21:41 - SSH > Using SSH protocol version 2 . 2023.10.28 00:21:41 - SSH > No GSSAPI security context available . 2023.10.28 00:21:41 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:21:41 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:21:41 - SSH > Host key fingerprint is: . 2023.10.28 00:21:41 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:41 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:21:41 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:21:41 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:21:41 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:21:41 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\ed7be43d27883e2fcf0eebb2538257de7a81d4952d61a453cd16c508ce53acbb.tmp.ppk" . 2023.10.28 00:21:41 - SSH > Using username "sshtunnel". . 2023.10.28 00:21:41 - SSH > Offered public key . 2023.10.28 00:21:41 - SSH > Offer of public key accepted . 2023.10.28 00:21:41 - SSH > Authenticating with public key "" . 2023.10.28 00:21:41 - SSH > Sent public key signature . 2023.10.28 00:21:41 - SSH > Access granted . 2023.10.28 00:21:41 - SSH > Local port 1178 forwarding to 127.0.0.1:2019 . 2023.10.28 00:21:41 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:41 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:21:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:21:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:21:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1178 . 2023.10.28 00:21:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:21:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:1178 [nonblock] . 2023.10.28 00:21:41 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57380 . 2023.10.28 00:21:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:1178 . 2023.10.28 00:21:41 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:21:41 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:1178 . 2023.10.28 00:21:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:1178, sid=3929f4d5 3b5e8af2 . 2023.10.28 00:21:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:21:41 - OpenVPN > VERIFY KU OK . 2023.10.28 00:21:41 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:21:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:21:41 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:21:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.10.28 00:21:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:21:41 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]127.0.0.1:1178 . 2023.10.28 00:21:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.55.1,dhcp-option DNS6 fde6:7a:7d20:1237::1,tun-ipv6,route-gateway 10.22.55.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1237::10db/64 fde6:7a:7d20:1237::1,ifconfig 10.22.55.221 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.28 00:21:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 00:21:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.55.1' . 2023.10.28 00:21:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1237::1' . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.10.28 00:21:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 00:21:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 00:21:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:42 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 00:21:42 - OpenVPN > open_tun . 2023.10.28 00:21:42 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.10.28 00:21:42 - OpenVPN > Exiting due to fatal error . 2023.10.28 00:21:42 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort ! 2023.10.28 00:21:42 - Disconnecting . 2023.10.28 00:21:42 - Sending hard termination signal . 2023.10.28 00:21:42 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:42 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:21:42 - Connection terminated. I 2023.10.28 00:21:45 - Checking authorization ... . 2023.10.28 00:21:46 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:46 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.10.28 00:21:46 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:46 - Routes, add 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", already exists. . 2023.10.28 00:21:46 - SSH > Looking up host "213.152.161.32" for SSH connection . 2023.10.28 00:21:46 - SSH > Connecting to 213.152.161.32 port 22 . 2023.10.28 00:21:46 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.73 . 2023.10.28 00:21:47 - SSH > Remote version: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 . 2023.10.28 00:21:47 - SSH > Using SSH protocol version 2 . 2023.10.28 00:21:47 - SSH > No GSSAPI security context available . 2023.10.28 00:21:47 - SSH > Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated) . 2023.10.28 00:21:47 - SSH > Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them . 2023.10.28 00:21:47 - SSH > Host key fingerprint is: . 2023.10.28 00:21:47 - SSH > ssh-ed25519 255 bd:68:16:50:30:b2:ec:0a:f7:e5:76:02:b8:bc:83:3a . 2023.10.28 00:21:47 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption . 2023.10.28 00:21:47 - SSH > Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm . 2023.10.28 00:21:47 - SSH > Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption . 2023.10.28 00:21:47 - SSH > Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm . 2023.10.28 00:21:47 - SSH > Reading key file "C:\Users\mijaj\AppData\Local\Eddie\1d08d696d7afeb090635d8cb3b87cb857be00bb1bd9348ec5fab54d939ca8ae3.tmp.ppk" . 2023.10.28 00:21:47 - SSH > Using username "sshtunnel". . 2023.10.28 00:21:47 - SSH > Offered public key . 2023.10.28 00:21:47 - SSH > Offer of public key accepted . 2023.10.28 00:21:47 - SSH > Authenticating with public key "" . 2023.10.28 00:21:47 - SSH > Sent public key signature . 2023.10.28 00:21:47 - SSH > Access granted . 2023.10.28 00:21:47 - SSH > Local port 6664 forwarding to 127.0.0.1:2019 . 2023.10.28 00:21:47 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:47 - SSH > Remote debug message: /home/sshtunnel/.ssh/authorized_keys:1: key options: agent-forwarding command permitopen port-forwarding user-rc . 2023.10.28 00:21:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 00:21:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 00:21:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 00:21:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 00:21:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 00:21:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:6664 . 2023.10.28 00:21:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 00:21:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:6664 [nonblock] . 2023.10.28 00:21:47 - SSH > Opening connection to 127.0.0.1:2019 for forwarding from 127.0.0.1:57384 . 2023.10.28 00:21:47 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:6664 . 2023.10.28 00:21:47 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.10.28 00:21:47 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:6664 . 2023.10.28 00:21:47 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:6664, sid=79c2b266 6e896d57 . 2023.10.28 00:21:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:21:47 - OpenVPN > VERIFY KU OK . 2023.10.28 00:21:47 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:21:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:21:47 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:21:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.10.28 00:21:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:21:47 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]127.0.0.1:6664 . 2023.10.28 00:21:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.55.1,dhcp-option DNS6 fde6:7a:7d20:1237::1,tun-ipv6,route-gateway 10.22.55.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1237::10db/64 fde6:7a:7d20:1237::1,ifconfig 10.22.55.221 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.28 00:21:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 00:21:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.55.1' . 2023.10.28 00:21:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1237::1' . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.10.28 00:21:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 00:21:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 00:21:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 00:21:47 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 00:21:47 - OpenVPN > open_tun . 2023.10.28 00:21:47 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.10.28 00:21:47 - OpenVPN > Exiting due to fatal error . 2023.10.28 00:21:47 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort ! 2023.10.28 00:21:47 - Disconnecting . 2023.10.28 00:21:47 - Sending hard termination signal . 2023.10.28 00:21:48 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)". . 2023.10.28 00:21:48 - Routes, delete 213.152.161.32/32 for interface "Wi-Fi (Intel(R) Wireless-AC 9461)", not exists. . 2023.10.28 00:21:48 - Connection terminated. I 2023.10.28 00:21:51 - Checking authorization ... . 2023.10.28 00:21:52 - Using WinTun network interface "Connexion au réseau local 3 (Windscribe Windtun420)" ! 2023.10.28 00:21:52 - Connecting to Merga (Netherlands, Alblasserdam) ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.254", "interface_index": 26, "metric": 0, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "192.168.1.124\/32", "gateway": "0.0.0.0", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "213.152.161.32\/32", "gateway": "192.168.1.254", "interface_index": 26, "metric": 0, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C4039F45-A221-4A40-A73A-197361E7D361}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 22, "metric": 256, "interface": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 24, "metric": 256, "interface": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2DA086D0-55C9-4444-9B31-0A393ED81848}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C4039F45-A221-4A40-A73A-197361E7D361}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 22, "metric": 256, "interface": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 24, "metric": 256, "interface": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2DA086D0-55C9-4444-9B31-0A393ED81848}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}" }, { "destination": "::\/0", "gateway": "fe80::160c:76ff:fe70:771", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "2a01:e0a:dab:c780::\/64", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "2a01:e0a:dab:c780:7602:1010:1996:5a30\/128", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "2a01:e0a:dab:c780:f1fe:57aa:edf8:8205\/128", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{C4039F45-A221-4A40-A73A-197361E7D361}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 22, "metric": 256, "interface": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 24, "metric": 256, "interface": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{2DA086D0-55C9-4444-9B31-0A393ED81848}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}" }, { "destination": "fe80::5457:b77e:40ee:3144\/128", "gateway": "::", "interface_index": 22, "metric": 256, "interface": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}" }, { "destination": "fe80::58bc:e910:67e9:17a4\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}" }, { "destination": "fe80::5b02:5a92:ba06:1f07\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{2DA086D0-55C9-4444-9B31-0A393ED81848}" }, { "destination": "fe80::88a1:f84f:8538:99d7\/128", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}" }, { "destination": "fe80::8990:585d:e0a3:250a\/128", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{C4039F45-A221-4A40-A73A-197361E7D361}" }, { "destination": "fe80::cbca:2c13:4be9:a2d8\/128", "gateway": "::", "interface_index": 24, "metric": 256, "interface": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}" }, { "destination": "fe80::d374:315f:c0f9:f7cd\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}" }, { "destination": "fe80::f473:e5a2:d941:b553\/128", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "fe80::fcab:d71e:aa56:ce18\/128", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{C4039F45-A221-4A40-A73A-197361E7D361}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 22, "metric": 256, "interface": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 24, "metric": 256, "interface": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 26, "metric": 256, "interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{2DA086D0-55C9-4444-9B31-0A393ED81848}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}" } ], "ipv4-default-gateway": "192.168.1.254", "ipv4-default-interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}", "ipv6-default-gateway": "fe80::160c:76ff:fe70:771", "ipv6-default-interface": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}", "interfaces": [ { "friendly": "Connexion au r\u00e9seau local 3", "id": "{A27CBB5E-562E-4621-BA28-61A5CF3A0159}", "name": "Connexion au r\u00e9seau local 3", "description": "Windscribe Windtun420", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::58bc:e910:67e9:17a4", "169.254.213.65" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local", "id": "{C4039F45-A221-4A40-A73A-197361E7D361}", "name": "Connexion au r\u00e9seau local", "description": "Windscribe VPN", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8990:585d:e0a3:250a", "169.254.23.227" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local 2", "id": "{123C16E8-ABA6-4FFF-BF56-B7F2FE5BDC7F}", "name": "Connexion au r\u00e9seau local 2", "description": "Windscribe VPN #2", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d374:315f:c0f9:f7cd", "169.254.87.158" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local 4", "id": "{CE36C857-0E1A-4941-B0A9-06D827D8E09C}", "name": "Connexion au r\u00e9seau local 4", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::5457:b77e:40ee:3144", "169.254.162.148" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local* 3", "id": "{2DA086D0-55C9-4444-9B31-0A393ED81848}", "name": "Connexion au r\u00e9seau local* 3", "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::5b02:5a92:ba06:1f07", "169.254.181.9" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local* 12", "id": "{CEACD7F4-86F6-4507-B01B-1E7F3D628571}", "name": "Connexion au r\u00e9seau local* 12", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::88a1:f84f:8538:99d7", "169.254.169.195" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 2", "id": "{BF1669DD-0B8B-4F9B-955E-B42328F2A23D}", "name": "Ethernet 2", "description": "Phantom TAP-Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::fcab:d71e:aa56:ce18", "169.254.215.66" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{FD2290DC-D7EB-4099-9355-F76CC5DC97FF}", "name": "Wi-Fi", "description": "Intel(R) Wireless-AC 9461", "type": "Wireless80211", "status": "Up", "bytes_received": "72206435", "bytes_sent": "4568138", "support_ipv4": true, "support_ipv6": true, "ips": [ "2a01:e0a:dab:c780:7602:1010:1996:5a30", "2a01:e0a:dab:c780:f1fe:57aa:edf8:8205", "fe80::f473:e5a2:d941:b553", "192.168.1.124" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Connexion r\u00e9seau Bluetooth", "id": "{F250D1F0-C08F-4DB2-B7E1-2C0B9108F48A}", "name": "Connexion r\u00e9seau Bluetooth", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::cbca:2c13:4be9:a2d8", "169.254.132.156" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{8295B315-9A5B-11E9-8D52-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Configuration IP de Windows Nom de l'h“te . . . . . . . . . . : LAPTOP-R8GJEGQL Suffixe DNS principal . . . . . . : Type de noeud. . . . . . . . . . : Mixte Routage IP activ‚ . . . . . . . . : Non Proxy WINS activ‚ . . . . . . . . : Non Carte inconnue Connexion au r‚seau local 3ÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Windscribe Windtun420 Adresse physique . . . . . . . . . . . : DHCP activ‚. . . . . . . . . . . . . . : Non Configuration automatique activ‚e. . . : Oui Carte inconnue Connexion au r‚seau localÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Windscribe VPN Adresse physique . . . . . . . . . . . : 00-FF-C4-03-9F-45 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte inconnue Connexion au r‚seau local 2ÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Windscribe VPN #2 Adresse physique . . . . . . . . . . . : 00-FF-12-3C-16-E8 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte inconnue Connexion au r‚seau local 4ÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : TAP-Windows Adapter V9 Adresse physique . . . . . . . . . . . : 00-FF-CE-36-C8-57 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte r‚seau sans fil Connexion au r‚seau local* 3ÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 Adresse physique . . . . . . . . . . . : 04-ED-33-D0-58-E1 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte r‚seau sans fil Connexion au r‚seau local* 12ÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 Adresse physique . . . . . . . . . . . : 06-ED-33-D0-58-E0 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte Ethernet Ethernet 2 : Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Phantom TAP-Windows Adapter V9 Adresse physique . . . . . . . . . . . : 00-FF-BF-16-69-DD DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Carte r‚seau sans fil Wi-Fiÿ: Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Intel(R) Wireless-AC 9461 Adresse physique . . . . . . . . . . . : 04-ED-33-D0-58-E0 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Adresse IPv6. . . . . . . . . . .ÿ. . .: 2a01:e0a:dab:c780:7602:1010:1996:5a30(pr‚f‚r‚) Adresse IPv6 temporaire . . . . . . . .: 2a01:e0a:dab:c780:f1fe:57aa:edf8:8205(pr‚f‚r‚) Adresse IPv6 de liaison locale. . . . .: fe80::f473:e5a2:d941:b553%26(pr‚f‚r‚) Adresse IPv4. . . . . . . . . . . . . .: 192.168.1.124(pr‚f‚r‚) Masque de sous-r‚seau. . . .ÿ. . . . . : 255.255.255.0 Bail obtenu. . . . . . . . .ÿ. . . . . : vendredi 27 octobre 2023 23:58:23 Bail expirant. . . . . . . . .ÿ. . . . : samedi 28 octobre 2023 11:58:25 Passerelle par d‚faut. . . .ÿ. . . . . : fe80::160c:76ff:fe70:771%26 192.168.1.254 Serveur DHCP . . . . . . . . . . . . . : 192.168.1.254 IAID DHCPv6 . . . . . . . . . . . : 168095027 DUID de client DHCPv6. . . . . . . . : 00-01-00-01-28-34-81-17-04-ED-33-D0-58-E0 Serveurs DNS. . . . . . . . . . . . . : 192.168.1.254 NetBIOS sur Tcpip. . . . . . . . . . . : Activ‚ Carte Ethernet Connexion r‚seau Bluetooth : Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Adresse physique . . . . . . . . . . . : 04-ED-33-D0-58-E4 DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui