Eddie System/Environment Report - 10/28/2023 - 7:41 AM UTC Eddie version: 2.23.1 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.22621.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.6.3 - OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.78 (C:\Program Files\AirVPN\plink.exe) SSL: 5.69 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\xxx\AppData\Local\Eddie\default.profile Data path: C:\Users\xxx\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Arkab OS support IPv4: Yes OS support IPv6: Yes Detected DNS: fde6:7a:7d20:5f6::1, 10.9.246.1, 2001:578:3f::30, 2001:578:3f:1::30, 68.105.28.11, 68.105.29.11, 68.105.28.12 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: 3746 ms Test Ping IPv6: 195 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True proxy.mode: none network.entry.iface: {9E255FD3-EEC9-433D-9D1B-E111A8DCA56D} openvpn.custom: mssfix 1430 openvpn.sndbuf: 524288 openvpn.rcvbuf: 524288 windows.ssh.plink.force: True ui.skip.promotional: True ---------------------------- Logs: . 2023.10.27 03:37:43 - Eddie version: 2.23.1 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.10.27 03:37:43 - Command line arguments (1): path="home" . 2023.10.27 03:37:43 - Raise system privileges . 2023.10.27 03:37:46 - Collect network information . 2023.10.27 03:37:47 - Reading options from C:\Users\SilverScorp\AppData\Local\Eddie\default.profile . 2023.10.27 03:37:48 - OpenVPN - Version: 2.6.3 - OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.10.27 03:37:48 - SSH - Version: plink 0.78 (C:\Program Files\AirVPN\plink.exe) . 2023.10.27 03:37:48 - SSL - Version: 5.69 (C:\Program Files\AirVPN\stunnel.exe) I 2023.10.27 03:37:49 - Ready . 2023.10.27 03:37:53 - Collect information about AirVPN completed I 2023.10.27 03:38:58 - Session starting. . 2023.10.27 03:38:58 - Activation of Network Lock - Windows Filtering Platform I 2023.10.27 03:38:58 - Checking authorization ... . 2023.10.27 03:38:59 - Collect network information . 2023.10.27 03:39:00 - Added new network interface "Eddie", Wintun version 0.12 . 2023.10.27 03:39:00 - Collect network information . 2023.10.27 03:39:01 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2023.10.27 03:39:01 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2023.10.27 03:39:02 - Routes, add 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 03:39:02 - Routes, add 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2023.10.27 03:39:02 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2023.10.27 03:39:02 - OpenVPN > OpenVPN 2.6.3 [git:v2.6.3/94aad8c51043a805] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Apr 26 2023 . 2023.10.27 03:39:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2023.10.27 03:39:02 - OpenVPN > library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 . 2023.10.27 03:39:02 - OpenVPN > DCO version: v0 . 2023.10.27 03:39:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:2018 . 2023.10.27 03:39:02 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2023.10.27 03:39:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.197:2018 . 2023.10.27 03:39:02 - OpenVPN > TCP connection established with [AF_INET]104.254.90.197:2018 . 2023.10.27 03:39:02 - OpenVPN > TCPv4_CLIENT link local (bound): [AF_INET]192.168.0.60:1194 . 2023.10.27 03:39:02 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]104.254.90.197:2018 . 2023.10.27 03:39:03 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:2018, sid=a656919b 800d9f21 . 2023.10.27 03:39:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 03:39:03 - OpenVPN > VERIFY KU OK . 2023.10.27 03:39:03 - OpenVPN > Validating certificate extended key usage . 2023.10.27 03:39:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 03:39:03 - OpenVPN > VERIFY EKU OK . 2023.10.27 03:39:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 03:39:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 03:39:04 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:2018 . 2023.10.27 03:39:04 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 03:39:04 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 03:39:05 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1) . 2023.10.27 03:39:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.247.1,dhcp-option DNS6 fde6:7a:7d20:19f7::1,tun-ipv6,route-gateway 10.29.247.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f7::108d/64 fde6:7a:7d20:19f7::1,ifconfig 10.29.247.143 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.27 03:39:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 03:39:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.247.1' . 2023.10.27 03:39:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f7::1' . 2023.10.27 03:39:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.27 03:39:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.27 03:39:05 - OpenVPN > interactive service msg_channel=0 . 2023.10.27 03:39:05 - OpenVPN > open_tun . 2023.10.27 03:39:05 - OpenVPN > wintun device [Eddie] opened . 2023.10.27 03:39:05 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.29.247.143 255.255.255.0 . 2023.10.27 03:39:05 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2023.10.27 03:39:05 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2023.10.27 03:39:05 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 03:39:05 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:19f7::108d/128 store=active . 2023.10.27 03:39:05 - OpenVPN > add_route_ipv6(fde6:7a:7d20:19f7::/64 -> fde6:7a:7d20:19f7::108d metric 0) IF 45 . 2023.10.27 03:39:05 - OpenVPN > IPv6 route added using ipapi . 2023.10.27 03:39:05 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2023.10.27 03:39:05 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 03:39:05 - OpenVPN > Initialization Sequence Completed . 2023.10.27 03:39:05 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.10.27 03:39:06 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.27 03:39:06 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.27 03:39:06 - DNS leak protection with packet filtering enabled. . 2023.10.27 03:39:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.247.1) . 2023.10.27 03:39:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:19f7::1) . 2023.10.27 03:39:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:08 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:09 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:10 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:10 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:11 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 03:39:11 - Flushing DNS I 2023.10.27 03:39:11 - Checking route IPv4 I 2023.10.27 03:39:13 - Checking route IPv6 I 2023.10.27 03:39:16 - Checking DNS ! 2023.10.27 03:39:18 - Connected. . 2023.10.27 03:39:18 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.10.27 04:07:55 - Collect information about AirVPN completed . 2023.10.27 04:38:08 - Collect information about AirVPN completed . 2023.10.27 04:38:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 04:38:31 - OpenVPN > VERIFY KU OK . 2023.10.27 04:38:31 - OpenVPN > Validating certificate extended key usage . 2023.10.27 04:38:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 04:38:31 - OpenVPN > VERIFY EKU OK . 2023.10.27 04:38:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 04:38:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 04:52:15 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (fd=1b4,code=10060) . 2023.10.27 04:52:15 - OpenVPN > Connection reset, restarting [-1] . 2023.10.27 04:52:15 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2023.10.27 04:52:15 - OpenVPN > Restart pause, 1 second(s) ! 2023.10.27 04:52:15 - Disconnecting . 2023.10.27 04:52:15 - Sending soft termination signal . 2023.10.27 04:52:18 - OpenVPN > Closing TUN/TAP interface . 2023.10.27 04:52:18 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:19f7::/64) . 2023.10.27 04:52:18 - OpenVPN > IPv6 route deleted using ipapi . 2023.10.27 04:52:18 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 45 fde6:7a:7d20:19f7::108d store=active . 2023.10.27 04:52:18 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 45 10.29.247.143 store=active . 2023.10.27 04:52:18 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.10.27 04:52:18 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:19 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:20 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:21 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:22 - Routes, delete 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 04:52:23 - Routes, delete 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:24 - Routes, delete 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:24 - Routes, delete 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", not exists. . 2023.10.27 04:52:24 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 04:52:24 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 04:52:24 - DNS leak protection with packet filtering disabled. . 2023.10.27 04:52:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.27 04:52:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.27 04:52:24 - Connection terminated. . 2023.10.27 04:52:27 - Waiting for latency tests (248 to go) . 2023.10.27 04:52:30 - Waiting for latency tests (131 to go) . 2023.10.27 04:52:31 - Waiting for latency tests (130 to go) I 2023.10.27 04:52:32 - Checking authorization ... . 2023.10.27 04:52:40 - Collect network information . 2023.10.27 04:52:40 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2023.10.27 04:52:40 - Connecting to Sham (Canada, Vancouver) . 2023.10.27 04:52:41 - Routes, add 192.30.89.77/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 04:52:41 - Routes, add 192.30.89.77/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2023.10.27 04:52:41 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2023.10.27 04:52:41 - OpenVPN > OpenVPN 2.6.3 [git:v2.6.3/94aad8c51043a805] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Apr 26 2023 . 2023.10.27 04:52:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2023.10.27 04:52:41 - OpenVPN > library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 . 2023.10.27 04:52:41 - OpenVPN > DCO version: v0 . 2023.10.27 04:52:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.77:2018 . 2023.10.27 04:52:41 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2023.10.27 04:52:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]192.30.89.77:2018 . 2023.10.27 04:52:42 - OpenVPN > TCP connection established with [AF_INET]192.30.89.77:2018 . 2023.10.27 04:52:42 - OpenVPN > TCPv4_CLIENT link local (bound): [AF_INET]192.168.0.60:1194 . 2023.10.27 04:52:42 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]192.30.89.77:2018 . 2023.10.27 04:52:42 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.77:2018, sid=54c9581e 382929d7 . 2023.10.27 04:52:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 04:52:42 - OpenVPN > VERIFY KU OK . 2023.10.27 04:52:42 - OpenVPN > Validating certificate extended key usage . 2023.10.27 04:52:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 04:52:42 - OpenVPN > VERIFY EKU OK . 2023.10.27 04:52:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sham, emailAddress=info@airvpn.org . 2023.10.27 04:52:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 04:52:43 - OpenVPN > [Sham] Peer Connection Initiated with [AF_INET]192.30.89.77:2018 . 2023.10.27 04:52:43 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 04:52:43 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 04:52:43 - OpenVPN > SENT CONTROL [Sham]: 'PUSH_REQUEST' (status=1) . 2023.10.27 04:52:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.103.1,dhcp-option DNS6 fde6:7a:7d20:1f67::1,tun-ipv6,route-gateway 10.35.103.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f67::10b3/64 fde6:7a:7d20:1f67::1,ifconfig 10.35.103.181 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.27 04:52:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 04:52:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.103.1' . 2023.10.27 04:52:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f67::1' . 2023.10.27 04:52:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.27 04:52:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.27 04:52:43 - OpenVPN > interactive service msg_channel=0 . 2023.10.27 04:52:43 - OpenVPN > open_tun . 2023.10.27 04:52:43 - OpenVPN > wintun device [Eddie] opened . 2023.10.27 04:52:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.35.103.181 255.255.255.0 . 2023.10.27 04:52:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2023.10.27 04:52:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2023.10.27 04:52:44 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 04:52:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:1f67::10b3/128 store=active . 2023.10.27 04:52:44 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f67::/64 -> fde6:7a:7d20:1f67::10b3 metric 0) IF 45 . 2023.10.27 04:52:44 - OpenVPN > IPv6 route added using ipapi . 2023.10.27 04:52:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2023.10.27 04:52:44 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 04:52:44 - OpenVPN > Initialization Sequence Completed . 2023.10.27 04:52:44 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.10.27 04:52:45 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.27 04:52:45 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.27 04:52:45 - DNS leak protection with packet filtering enabled. . 2023.10.27 04:52:46 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.103.1) . 2023.10.27 04:52:46 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f67::1) . 2023.10.27 04:52:46 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:47 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:48 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:49 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:50 - Routes, add 192.30.89.75/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:50 - Routes, add 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 04:52:50 - Flushing DNS I 2023.10.27 04:52:50 - Checking route IPv4 I 2023.10.27 04:53:01 - Checking route IPv6 I 2023.10.27 04:53:07 - Checking DNS ! 2023.10.27 04:53:19 - Connected. . 2023.10.27 04:53:19 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.10.27 05:07:59 - OpenVPN > read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (fd=1d0,code=10060) . 2023.10.27 05:07:59 - OpenVPN > Connection reset, restarting [-1] . 2023.10.27 05:07:59 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2023.10.27 05:07:59 - OpenVPN > Restart pause, 1 second(s) ! 2023.10.27 05:07:59 - Disconnecting . 2023.10.27 05:07:59 - Sending soft termination signal . 2023.10.27 05:08:02 - OpenVPN > Closing TUN/TAP interface . 2023.10.27 05:08:02 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f67::/64) . 2023.10.27 05:08:02 - OpenVPN > IPv6 route deleted using ipapi . 2023.10.27 05:08:02 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 45 fde6:7a:7d20:1f67::10b3 store=active . 2023.10.27 05:08:02 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 45 10.35.103.181 store=active . 2023.10.27 05:08:02 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.10.27 05:08:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:04 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:04 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:05 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:07 - Routes, delete 192.30.89.77/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 05:08:08 - Routes, delete 192.30.89.75/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:09 - Routes, delete 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:09 - Routes, delete 192.30.89.77/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", not exists. . 2023.10.27 05:08:09 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 05:08:09 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 05:08:09 - DNS leak protection with packet filtering disabled. . 2023.10.27 05:08:09 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.27 05:08:09 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.27 05:08:09 - Connection terminated. . 2023.10.27 05:08:13 - Waiting for latency tests (248 to go) . 2023.10.27 05:08:13 - Collect information about AirVPN completed . 2023.10.27 05:08:15 - Waiting for latency tests (246 to go) . 2023.10.27 05:08:16 - Waiting for latency tests (237 to go) I 2023.10.27 05:08:17 - Checking authorization ... . 2023.10.27 05:08:21 - Collect network information . 2023.10.27 05:08:21 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2023.10.27 05:08:21 - Connecting to Suhail (Netherlands, Alblasserdam) . 2023.10.27 05:08:22 - Routes, add 134.19.179.189/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 05:08:23 - Routes, add 134.19.179.189/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2023.10.27 05:08:23 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2023.10.27 05:08:23 - OpenVPN > OpenVPN 2.6.3 [git:v2.6.3/94aad8c51043a805] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Apr 26 2023 . 2023.10.27 05:08:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2023.10.27 05:08:23 - OpenVPN > library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 . 2023.10.27 05:08:23 - OpenVPN > DCO version: v0 . 2023.10.27 05:08:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.189:2018 . 2023.10.27 05:08:23 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2023.10.27 05:08:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]134.19.179.189:2018 . 2023.10.27 05:08:23 - OpenVPN > TCP connection established with [AF_INET]134.19.179.189:2018 . 2023.10.27 05:08:23 - OpenVPN > TCPv4_CLIENT link local (bound): [AF_INET]192.168.0.60:1194 . 2023.10.27 05:08:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]134.19.179.189:2018 . 2023.10.27 05:08:23 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.189:2018, sid=ee7ef7d6 84e32938 . 2023.10.27 05:08:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 05:08:24 - OpenVPN > VERIFY KU OK . 2023.10.27 05:08:24 - OpenVPN > Validating certificate extended key usage . 2023.10.27 05:08:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 05:08:24 - OpenVPN > VERIFY EKU OK . 2023.10.27 05:08:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Suhail, emailAddress=info@airvpn.org . 2023.10.27 05:08:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 05:08:24 - OpenVPN > [Suhail] Peer Connection Initiated with [AF_INET]134.19.179.189:2018 . 2023.10.27 05:08:24 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 05:08:24 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 05:08:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.151.1,dhcp-option DNS6 fde6:7a:7d20:1e97::1,tun-ipv6,route-gateway 10.34.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e97::100d/64 fde6:7a:7d20:1e97::1,ifconfig 10.34.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.10.27 05:08:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 05:08:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.151.1' . 2023.10.27 05:08:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1e97::1' . 2023.10.27 05:08:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.27 05:08:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.27 05:08:25 - OpenVPN > interactive service msg_channel=0 . 2023.10.27 05:08:25 - OpenVPN > open_tun . 2023.10.27 05:08:25 - OpenVPN > wintun device [Eddie] opened . 2023.10.27 05:08:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.34.151.15 255.255.255.0 . 2023.10.27 05:08:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2023.10.27 05:08:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2023.10.27 05:08:26 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 05:08:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:1e97::100d/128 store=active . 2023.10.27 05:08:26 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1e97::/64 -> fde6:7a:7d20:1e97::100d metric 0) IF 45 . 2023.10.27 05:08:26 - OpenVPN > IPv6 route added using ipapi . 2023.10.27 05:08:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2023.10.27 05:08:26 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 05:08:26 - OpenVPN > Initialization Sequence Completed . 2023.10.27 05:08:26 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.10.27 05:08:26 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.27 05:08:26 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.27 05:08:26 - DNS leak protection with packet filtering enabled. . 2023.10.27 05:08:27 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.34.151.1) . 2023.10.27 05:08:27 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1e97::1) . 2023.10.27 05:08:28 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:29 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:30 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:31 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:32 - Routes, add 134.19.179.187/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:32 - Routes, add 2a00:1678:2470:1001:63f4:41:52a6:8a00/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:08:32 - Flushing DNS I 2023.10.27 05:08:32 - Checking route IPv4 I 2023.10.27 05:08:47 - Checking route IPv6 I 2023.10.27 05:08:55 - Checking DNS ! 2023.10.27 05:09:00 - Connected. . 2023.10.27 05:09:00 - OpenVPN > Timers: ping 10, ping-restart 60 ! 2023.10.27 05:35:00 - Disconnecting . 2023.10.27 05:35:00 - Sending soft termination signal . 2023.10.27 05:35:03 - OpenVPN > Closing TUN/TAP interface . 2023.10.27 05:35:03 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1e97::/64) . 2023.10.27 05:35:03 - OpenVPN > IPv6 route deleted using ipapi . 2023.10.27 05:35:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 45 fde6:7a:7d20:1e97::100d store=active . 2023.10.27 05:35:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 45 10.34.151.15 store=active . 2023.10.27 05:35:03 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.10.27 05:35:04 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:04 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:05 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:06 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:06 - Routes, delete 134.19.179.189/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 05:35:07 - Routes, delete 134.19.179.187/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:08 - Routes, delete 2a00:1678:2470:1001:63f4:41:52a6:8a00/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:35:08 - Routes, delete 134.19.179.189/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", not exists. . 2023.10.27 05:35:08 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 05:35:08 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 05:35:08 - DNS leak protection with packet filtering disabled. . 2023.10.27 05:35:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.27 05:35:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.27 05:35:08 - Connection terminated. . 2023.10.27 05:35:08 - Flushing DNS . 2023.10.27 05:35:08 - Deactivation of Network Lock ! 2023.10.27 05:35:09 - Session terminated. I 2023.10.27 05:36:35 - Session starting. . 2023.10.27 05:36:35 - Activation of Network Lock - Windows Filtering Platform I 2023.10.27 05:36:35 - Checking authorization ... . 2023.10.27 05:36:36 - Collect network information . 2023.10.27 05:36:37 - Added new network interface "Eddie", Wintun version 0.12 . 2023.10.27 05:36:37 - Collect network information . 2023.10.27 05:36:37 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2023.10.27 05:36:37 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2023.10.27 05:36:38 - Routes, add 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 05:36:39 - Routes, add 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2023.10.27 05:36:39 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2023.10.27 05:36:39 - OpenVPN > OpenVPN 2.6.3 [git:v2.6.3/94aad8c51043a805] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Apr 26 2023 . 2023.10.27 05:36:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2023.10.27 05:36:39 - OpenVPN > library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 . 2023.10.27 05:36:39 - OpenVPN > DCO version: v0 . 2023.10.27 05:36:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443 . 2023.10.27 05:36:39 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2023.10.27 05:36:39 - OpenVPN > UDPv4 link local (bound): [AF_INET]192.168.0.60:1194 . 2023.10.27 05:36:39 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.197:443 . 2023.10.27 05:36:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=fa8ff4c2 2f69b821 . 2023.10.27 05:36:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 05:36:39 - OpenVPN > VERIFY KU OK . 2023.10.27 05:36:39 - OpenVPN > Validating certificate extended key usage . 2023.10.27 05:36:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 05:36:39 - OpenVPN > VERIFY EKU OK . 2023.10.27 05:36:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 05:36:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 05:36:40 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443 . 2023.10.27 05:36:40 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 05:36:40 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 05:36:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.246.1,dhcp-option DNS6 fde6:7a:7d20:19f6::1,tun-ipv6,route-gateway 10.29.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f6::10ba/64 fde6:7a:7d20:19f6::1,ifconfig 10.29.246.188 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.10.27 05:36:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 05:36:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.246.1' . 2023.10.27 05:36:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f6::1' . 2023.10.27 05:36:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.27 05:36:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.27 05:36:40 - OpenVPN > interactive service msg_channel=0 . 2023.10.27 05:36:40 - OpenVPN > open_tun . 2023.10.27 05:36:40 - OpenVPN > wintun device [Eddie] opened . 2023.10.27 05:36:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.29.246.188 255.255.255.0 . 2023.10.27 05:36:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2023.10.27 05:36:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2023.10.27 05:36:41 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 05:36:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:19f6::10ba/128 store=active . 2023.10.27 05:36:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:19f6::/64 -> fde6:7a:7d20:19f6::10ba metric 0) IF 45 . 2023.10.27 05:36:41 - OpenVPN > IPv6 route added using ipapi . 2023.10.27 05:36:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2023.10.27 05:36:41 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 05:36:41 - OpenVPN > Initialization Sequence Completed . 2023.10.27 05:36:41 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 4, compression: 'stub' . 2023.10.27 05:36:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.27 05:36:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.27 05:36:42 - DNS leak protection with packet filtering enabled. . 2023.10.27 05:36:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.246.1) . 2023.10.27 05:36:43 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:19f6::1) . 2023.10.27 05:36:43 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:44 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:45 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:46 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:47 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:48 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 05:36:48 - Flushing DNS I 2023.10.27 05:36:48 - Checking route IPv4 I 2023.10.27 05:36:48 - Checking route IPv6 I 2023.10.27 05:36:52 - Checking DNS ! 2023.10.27 05:36:54 - Connected. . 2023.10.27 05:36:54 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.10.27 05:36:54 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.10.27 05:38:11 - Collect information about AirVPN completed . 2023.10.27 05:59:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2344538 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 05:59:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2344539 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 05:59:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2344540 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 06:36:11 - Above log line repeated 86 times more . 2023.10.27 06:36:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 06:36:11 - OpenVPN > VERIFY KU OK . 2023.10.27 06:36:11 - OpenVPN > Validating certificate extended key usage . 2023.10.27 06:36:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 06:36:11 - OpenVPN > VERIFY EKU OK . 2023.10.27 06:36:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 06:36:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 06:54:01 - OpenVPN > write UDPv4: The requested address is not valid in its context. (fd=1d0,code=10049) . 2023.10.27 06:54:01 - OpenVPN > write UDPv4: The requested address is not valid in its context. (fd=1d0,code=10049) . 2023.10.27 06:54:01 - OpenVPN > write UDPv4: The requested address is not valid in its context. (fd=1d0,code=10049) . 2023.10.27 07:35:45 - Above log line repeated 624 times more . 2023.10.27 07:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 07:35:45 - OpenVPN > VERIFY KU OK . 2023.10.27 07:35:45 - OpenVPN > Validating certificate extended key usage . 2023.10.27 07:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 07:35:45 - OpenVPN > VERIFY EKU OK . 2023.10.27 07:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 07:35:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 08:35:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 08:35:11 - OpenVPN > VERIFY KU OK . 2023.10.27 08:35:11 - OpenVPN > Validating certificate extended key usage . 2023.10.27 08:35:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 08:35:11 - OpenVPN > VERIFY EKU OK . 2023.10.27 08:35:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 08:35:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 09:34:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 09:34:37 - OpenVPN > VERIFY KU OK . 2023.10.27 09:34:37 - OpenVPN > Validating certificate extended key usage . 2023.10.27 09:34:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 09:34:37 - OpenVPN > VERIFY EKU OK . 2023.10.27 09:34:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 09:34:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 10:34:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 10:34:03 - OpenVPN > VERIFY KU OK . 2023.10.27 10:34:03 - OpenVPN > Validating certificate extended key usage . 2023.10.27 10:34:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 10:34:03 - OpenVPN > VERIFY EKU OK . 2023.10.27 10:34:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 10:34:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 11:33:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 11:33:29 - OpenVPN > VERIFY KU OK . 2023.10.27 11:33:29 - OpenVPN > Validating certificate extended key usage . 2023.10.27 11:33:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 11:33:29 - OpenVPN > VERIFY EKU OK . 2023.10.27 11:33:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 11:33:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 12:33:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 12:33:00 - OpenVPN > VERIFY KU OK . 2023.10.27 12:33:00 - OpenVPN > Validating certificate extended key usage . 2023.10.27 12:33:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 12:33:00 - OpenVPN > VERIFY EKU OK . 2023.10.27 12:33:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 12:33:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 13:32:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 13:32:25 - OpenVPN > VERIFY KU OK . 2023.10.27 13:32:25 - OpenVPN > Validating certificate extended key usage . 2023.10.27 13:32:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 13:32:25 - OpenVPN > VERIFY EKU OK . 2023.10.27 13:32:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 13:32:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 14:31:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 14:31:52 - OpenVPN > VERIFY KU OK . 2023.10.27 14:31:52 - OpenVPN > Validating certificate extended key usage . 2023.10.27 14:31:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 14:31:52 - OpenVPN > VERIFY EKU OK . 2023.10.27 14:31:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 14:31:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 15:31:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 15:31:17 - OpenVPN > VERIFY KU OK . 2023.10.27 15:31:17 - OpenVPN > Validating certificate extended key usage . 2023.10.27 15:31:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 15:31:17 - OpenVPN > VERIFY EKU OK . 2023.10.27 15:31:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 15:31:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 16:13:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #634244 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 16:13:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #634245 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 16:13:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #634246 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 16:30:57 - Above log line repeated 21 times more . 2023.10.27 16:30:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 16:30:57 - OpenVPN > VERIFY KU OK . 2023.10.27 16:30:57 - OpenVPN > Validating certificate extended key usage . 2023.10.27 16:30:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 16:30:57 - OpenVPN > VERIFY EKU OK . 2023.10.27 16:30:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 16:31:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 17:30:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 17:30:52 - OpenVPN > VERIFY KU OK . 2023.10.27 17:30:52 - OpenVPN > Validating certificate extended key usage . 2023.10.27 17:30:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 17:30:52 - OpenVPN > VERIFY EKU OK . 2023.10.27 17:30:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 17:30:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 18:30:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 18:30:45 - OpenVPN > VERIFY KU OK . 2023.10.27 18:30:45 - OpenVPN > Validating certificate extended key usage . 2023.10.27 18:30:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 18:30:45 - OpenVPN > VERIFY EKU OK . 2023.10.27 18:30:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 18:30:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 19:30:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 19:30:15 - OpenVPN > VERIFY KU OK . 2023.10.27 19:30:15 - OpenVPN > Validating certificate extended key usage . 2023.10.27 19:30:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 19:30:15 - OpenVPN > VERIFY EKU OK . 2023.10.27 19:30:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 19:30:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 20:29:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 20:29:58 - OpenVPN > VERIFY KU OK . 2023.10.27 20:29:58 - OpenVPN > Validating certificate extended key usage . 2023.10.27 20:29:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 20:29:58 - OpenVPN > VERIFY EKU OK . 2023.10.27 20:29:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 20:29:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 21:29:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 21:29:27 - OpenVPN > VERIFY KU OK . 2023.10.27 21:29:27 - OpenVPN > Validating certificate extended key usage . 2023.10.27 21:29:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 21:29:27 - OpenVPN > VERIFY EKU OK . 2023.10.27 21:29:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 21:29:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 22:29:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 22:29:07 - OpenVPN > VERIFY KU OK . 2023.10.27 22:29:07 - OpenVPN > Validating certificate extended key usage . 2023.10.27 22:29:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 22:29:07 - OpenVPN > VERIFY EKU OK . 2023.10.27 22:29:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 22:29:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 23:08:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3326855 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 23:08:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3326856 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 23:08:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3326857 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.10.27 23:29:42 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2023.10.27 23:29:42 - OpenVPN > TLS Error: TLS handshake failed . 2023.10.27 23:29:42 - OpenVPN > TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1 . 2023.10.27 23:29:57 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=529fcc83 4ff58f8f . 2023.10.27 23:29:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 23:29:57 - OpenVPN > VERIFY KU OK . 2023.10.27 23:29:57 - OpenVPN > Validating certificate extended key usage . 2023.10.27 23:29:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 23:29:57 - OpenVPN > VERIFY EKU OK . 2023.10.27 23:29:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2023.10.27 23:29:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 23:29:57 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 23:29:57 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 23:29:58 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1) . 2023.10.27 23:29:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.246.1,dhcp-option DNS6 fde6:7a:7d20:19f6::1,tun-ipv6,route-gateway 10.29.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f6::10ba/64 fde6:7a:7d20:19f6::1,ifconfig 10.29.246.188 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.10.27 23:29:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 23:29:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.246.1' . 2023.10.27 23:29:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f6::1' . 2023.10.27 23:29:58 - OpenVPN > Initialization Sequence Completed . 2023.10.27 23:29:58 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 4, compression: 'stub' . 2023.10.27 23:29:58 - Windows WFP, unexpected: Rule 'dns_block_all' already exists . 2023.10.27 23:29:58 - Windows WFP, unexpected: Rule 'dns_permit_openvpn' already exists . 2023.10.27 23:29:58 - Windows WFP, unexpected: Rule 'dns_permit_tap' already exists . 2023.10.27 23:29:58 - DNS leak protection with packet filtering enabled. . 2023.10.27 23:29:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)", already exists. . 2023.10.27 23:30:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)", already exists. . 2023.10.27 23:30:00 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)", already exists. . 2023.10.27 23:30:01 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)", already exists. . 2023.10.27 23:30:01 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)", already exists. . 2023.10.27 23:30:01 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)", already exists. W 2023.10.27 23:30:01 - Unexpected status. . 2023.10.27 23:30:01 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.10.27 23:30:01 - OpenVPN > Protocol options: explicit-exit-notify 5 ! 2023.10.27 23:30:01 - Disconnecting . 2023.10.27 23:30:01 - Sending soft termination signal . 2023.10.27 23:30:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.10.27 23:30:06 - OpenVPN > Closing TUN/TAP interface . 2023.10.27 23:30:06 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:19f6::/64) . 2023.10.27 23:30:06 - OpenVPN > IPv6 route deleted using ipapi . 2023.10.27 23:30:06 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 45 fde6:7a:7d20:19f6::10ba store=active . 2023.10.27 23:30:07 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 45 10.29.246.188 store=active . 2023.10.27 23:30:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.10.27 23:30:08 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:08 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:09 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:10 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:10 - Routes, delete 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 23:30:11 - Routes, delete 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:12 - Routes, delete 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:12 - Routes, delete 104.254.90.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", not exists. . 2023.10.27 23:30:12 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 23:30:12 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.27 23:30:12 - DNS leak protection with packet filtering disabled. . 2023.10.27 23:30:13 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.27 23:30:13 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.27 23:30:13 - Connection terminated. . 2023.10.27 23:30:16 - Waiting for latency tests (248 to go) I 2023.10.27 23:30:20 - Checking authorization ... . 2023.10.27 23:30:28 - Collect network information . 2023.10.27 23:30:28 - Collect information about AirVPN completed . 2023.10.27 23:30:28 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2023.10.27 23:30:28 - Connecting to Arkab (Canada, Toronto, Ontario) . 2023.10.27 23:30:29 - Routes, add 184.75.221.213/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2023.10.27 23:30:29 - Routes, add 184.75.221.213/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2023.10.27 23:30:29 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2023.10.27 23:30:29 - OpenVPN > OpenVPN 2.6.3 [git:v2.6.3/94aad8c51043a805] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Apr 26 2023 . 2023.10.27 23:30:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2023.10.27 23:30:29 - OpenVPN > library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10 . 2023.10.27 23:30:29 - OpenVPN > DCO version: v0 . 2023.10.27 23:30:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443 . 2023.10.27 23:30:29 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2023.10.27 23:30:29 - OpenVPN > UDPv4 link local (bound): [AF_INET]192.168.0.60:1194 . 2023.10.27 23:30:29 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.213:443 . 2023.10.27 23:30:30 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=c2ef0ca0 ef665027 . 2023.10.27 23:30:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.27 23:30:30 - OpenVPN > VERIFY KU OK . 2023.10.27 23:30:30 - OpenVPN > Validating certificate extended key usage . 2023.10.27 23:30:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.27 23:30:30 - OpenVPN > VERIFY EKU OK . 2023.10.27 23:30:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org . 2023.10.27 23:30:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.27 23:30:30 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.213:443 . 2023.10.27 23:30:30 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.10.27 23:30:30 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.10.27 23:30:31 - OpenVPN > SENT CONTROL [Arkab]: 'PUSH_REQUEST' (status=1) . 2023.10.27 23:30:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.246.1,dhcp-option DNS6 fde6:7a:7d20:5f6::1,tun-ipv6,route-gateway 10.9.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5f6::1018/64 fde6:7a:7d20:5f6::1,ifconfig 10.9.246.26 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2023.10.27 23:30:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.27 23:30:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.246.1' . 2023.10.27 23:30:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5f6::1' . 2023.10.27 23:30:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.27 23:30:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.27 23:30:31 - OpenVPN > interactive service msg_channel=0 . 2023.10.27 23:30:31 - OpenVPN > open_tun . 2023.10.27 23:30:31 - OpenVPN > wintun device [Eddie] opened . 2023.10.27 23:30:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.9.246.26 255.255.255.0 . 2023.10.27 23:30:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2023.10.27 23:30:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2023.10.27 23:30:32 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 23:30:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:5f6::1018/128 store=active . 2023.10.27 23:30:32 - OpenVPN > add_route_ipv6(fde6:7a:7d20:5f6::/64 -> fde6:7a:7d20:5f6::1018 metric 0) IF 45 . 2023.10.27 23:30:32 - OpenVPN > IPv6 route added using ipapi . 2023.10.27 23:30:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2023.10.27 23:30:32 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2023.10.27 23:30:32 - OpenVPN > Initialization Sequence Completed . 2023.10.27 23:30:32 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 9, compression: 'stub' . 2023.10.27 23:30:32 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.27 23:30:32 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.27 23:30:32 - DNS leak protection with packet filtering enabled. . 2023.10.27 23:30:33 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.9.246.1) . 2023.10.27 23:30:33 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:5f6::1) . 2023.10.27 23:30:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:34 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:35 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:36 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:37 - Routes, add 184.75.221.211/32 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:37 - Routes, add 2606:6080:1001:17:9ea4:71f9:d294:d7b7/128 for interface "Eddie (Eddie Tunnel)". . 2023.10.27 23:30:37 - Flushing DNS I 2023.10.27 23:30:38 - Checking route IPv4 I 2023.10.27 23:30:41 - Checking route IPv6 I 2023.10.27 23:30:43 - Checking DNS ! 2023.10.27 23:30:44 - Connected. . 2023.10.27 23:30:44 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.10.27 23:30:44 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.10.27 23:30:45 - Collect information about AirVPN completed . 2023.10.28 00:01:25 - Collect information about AirVPN completed . 2023.10.28 00:24:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 00:24:38 - OpenVPN > VERIFY KU OK . 2023.10.28 00:24:38 - OpenVPN > Validating certificate extended key usage . 2023.10.28 00:24:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 00:24:38 - OpenVPN > VERIFY EKU OK . 2023.10.28 00:24:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org . 2023.10.28 00:24:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 00:31:01 - Collect information about AirVPN completed ---------------------------- Network Info: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface_index": 13, "metric": 0, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "0.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "10.9.246.0\/24", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "10.9.246.26\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "10.9.246.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "128.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "184.75.221.211\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "184.75.221.213\/32", "gateway": "192.168.0.1", "interface_index": 13, "metric": 0, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "192.168.0.0\/24", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "192.168.0.60\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "192.168.0.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{3147DB47-302D-44FE-86F9-36B9227D0D54}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{3147DB47-302D-44FE-86F9-36B9227D0D54}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "::\/0", "gateway": "fe80::ca9e:43ff:fe7a:1b12", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "::\/1", "gateway": "::", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "2600:8800:7300:8065::\/64", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "2600:8800:7300:8065::\/64", "gateway": "fe80::ca9e:43ff:fe7a:1b12", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "2600:8800:7300:8065:1be6:c162:2b8b:88d0\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "2600:8800:7300:8065:69d8:f895:47e5:1494\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "2606:6080:1001:17:9ea4:71f9:d294:d7b7\/128", "gateway": "::", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "8000::\/1", "gateway": "::", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "fde6:7a:7d20:5f6::\/64", "gateway": "fe80::8", "interface_index": 45, "metric": 0, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "fde6:7a:7d20:5f6::1018\/128", "gateway": "::", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3147DB47-302D-44FE-86F9-36B9227D0D54}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "fe80::19e1:753d:b7bb:7bc1\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}" }, { "destination": "fe80::9cd9:d6ee:e6d3:dd76\/128", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}" }, { "destination": "fe80::a69c:cbfb:ec5e:e77f\/128", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}" }, { "destination": "fe80::ada4:cd13:27c5:a16\/128", "gateway": "::", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" }, { "destination": "fe80::cb52:16c7:661:be3e\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3147DB47-302D-44FE-86F9-36B9227D0D54}" }, { "destination": "fe80::d46e:85a1:db2:2ba6\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "fe80::db2b:bb63:3a84:3604\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{9A783C86-B321-11ED-95FF-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3147DB47-302D-44FE-86F9-36B9227D0D54}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 45, "metric": 256, "interface": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}" } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}", "ipv6-default-gateway": "fe80::ca9e:43ff:fe7a:1b12", "ipv6-default-interface": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}", "interfaces": [ { "friendly": "Eddie", "id": "{4F560C35-9AAA-43C2-97D1-9C62D5212061}", "name": "Eddie", "description": "Eddie Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "50978903761", "bytes_sent": "1888164083", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:5f6::1018", "fe80::ada4:cd13:27c5:a16", "10.9.246.26" ], "bind": true, "dns4": "10.9.246.1", "dns6": "fde6:7a:7d20:5f6::1", "device_id": "wintun" }, { "friendly": "Ethernet", "id": "{7BE5C778-224F-4F50-8BD3-2D45FB2BA132}", "name": "Ethernet", "description": "Intel(R) 82579LM Gigabit Network Connection", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9cd9:d6ee:e6d3:dd76", "169.254.144.23" ], "bind": true, "dns4": "", "dns6": "", "device_id": "PCI\\VEN_8086&DEV_1502" }, { "friendly": "Local Area Connection", "id": "{3147DB47-302D-44FE-86F9-36B9227D0D54}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::cb52:16c7:661:be3e", "169.254.7.17" ], "bind": true, "dns4": "", "dns6": "", "device_id": "tap0901" }, { "friendly": "Local Area Connection* 11", "id": "{BC55280A-67CF-4BC1-B129-26ACD3FEDC8F}", "name": "Local Area Connection* 11", "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::19e1:753d:b7bb:7bc1", "169.254.173.38" ], "bind": true, "dns4": "", "dns6": "", "device_id": "{5d624f94-8850-40c3-a3fa-a4fd2080baf3}\\vwifimp_wfd" }, { "friendly": "Local Area Connection* 12", "id": "{3D14EF17-F252-49B5-9D37-3283C1DD685E}", "name": "Local Area Connection* 12", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::db2b:bb63:3a84:3604", "169.254.137.45" ], "bind": true, "dns4": "", "dns6": "", "device_id": "{5d624f94-8850-40c3-a3fa-a4fd2080baf3}\\vwifimp_wfd" }, { "friendly": "Wi-Fi 2", "id": "{9E255FD3-EEC9-433D-9D1B-E111A8DCA56D}", "name": "Wi-Fi 2", "description": "Intel(R) Wi-Fi 6E AX210 160MHz", "type": "Wireless80211", "status": "Up", "bytes_received": "3218884814", "bytes_sent": "201318156", "support_ipv4": true, "support_ipv6": true, "ips": [ "2600:8800:7300:8065:1be6:c162:2b8b:88d0", "2600:8800:7300:8065:69d8:f895:47e5:1494", "fe80::d46e:85a1:db2:2ba6", "192.168.0.60" ], "bind": true, "dns4": "", "dns6": "", "device_id": "PCI\\VEN_8086&DEV_2725&SUBSYS_00208086" }, { "friendly": "Bluetooth Network Connection", "id": "{FDA47E6C-9F6C-4CA7-A6B6-5D09BDD66D6D}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a69c:cbfb:ec5e:e77f", "169.254.141.123" ], "bind": true, "dns4": "", "dns6": "", "device_id": "BTH\\MS_BTHPAN" }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{9A783C86-B321-11ED-95FF-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ovpn-dco version: wintun version: Automatic tap-windows6 version: ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-J0SL98B Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter Eddie: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Eddie Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:5f6::1018(Preferred) Link-local IPv6 Address . . . . . : fe80::ada4:cd13:27c5:a16%45(Preferred) IPv4 Address. . . . . . . . . . . : 10.9.246.26(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : fde6:7a:7d20:5f6::1 10.9.246.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection Physical Address. . . . . . . . . : 90-B1-1C-79-75-9B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-31-47-DB-47 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 Physical Address. . . . . . . . . : F0-B6-1E-93-86-64 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 12: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 Physical Address. . . . . . . . . : F2-B6-1E-93-86-63 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Wi-Fi 6E AX210 160MHz Physical Address. . . . . . . . . : F0-B6-1E-93-86-63 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2600:8800:7300:8065:1be6:c162:2b8b:88d0(Preferred) Temporary IPv6 Address. . . . . . : 2600:8800:7300:8065:69d8:f895:47e5:1494(Preferred) Link-local IPv6 Address . . . . . : fe80::d46e:85a1:db2:2ba6%13(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.60(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, October 27, 2023 6:54:09 AM Lease Expires . . . . . . . . . . : Sunday, October 29, 2023 12:37:29 AM Default Gateway . . . . . . . . . : fe80::ca9e:43ff:fe7a:1b12%13 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 166770206 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-8B-14-4A-90-B1-1C-79-75-9B DNS Servers . . . . . . . . . . . : 2001:578:3f::30 2001:578:3f:1::30 68.105.28.11 68.105.29.11 68.105.28.12 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : F0-B6-1E-93-86-67 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes