. 2023.11.14 15:51:47 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:51:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:51:47 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:51:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Carinae, emailAddress=info@airvpn.org . 2023.11.14 15:51:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:51:47 - OpenVPN > [Carinae] Peer Connection Initiated with [AF_INET]146.70.61.133:443 . 2023.11.14 15:51:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.206.1,dhcp-option DNS6 fde6:7a:7d20:8ce::1,tun-ipv6,route-gateway 10.12.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8ce::10f3/64 fde6:7a:7d20:8ce::1,ifconfig 10.12.206.245 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.14 15:51:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:51:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.206.1' . 2023.11.14 15:51:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:8ce::1' . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:51:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:51:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:51:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:47 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:51:47 - OpenVPN > open_tun . 2023.11.14 15:51:47 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:51:47 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:51:47 - Disconnecting . 2023.11.14 15:51:47 - Routes, delete 146.70.61.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:51:48 - Routes, delete 146.70.61.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:51:48 - Connection terminated. I 2023.11.14 15:51:51 - Checking authorization ... . 2023.11.14 15:51:51 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:51:51 - Connecting to Asterope (United Kingdom of Great Britain and Northern Ireland, Manchester) . 2023.11.14 15:51:51 - Routes, add 89.249.74.215/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:51:52 - Routes, add 89.249.74.215/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:51:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:51:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:51:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:51:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:51:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:51:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:51:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:51:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.215:443 . 2023.11.14 15:51:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:51:52 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:51:52 - OpenVPN > UDP link remote: [AF_INET]89.249.74.215:443 . 2023.11.14 15:51:52 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.215:443, sid=d36b439b 63806f4f . 2023.11.14 15:51:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:51:52 - OpenVPN > VERIFY KU OK . 2023.11.14 15:51:52 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:51:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:51:52 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:51:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asterope, emailAddress=info@airvpn.org . 2023.11.14 15:51:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:51:52 - OpenVPN > [Asterope] Peer Connection Initiated with [AF_INET]89.249.74.215:443 . 2023.11.14 15:51:52 - OpenVPN > SENT CONTROL [Asterope]: 'PUSH_REQUEST' (status=1) . 2023.11.14 15:51:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.78.1,dhcp-option DNS6 fde6:7a:7d20:64e::1,tun-ipv6,route-gateway 10.10.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:64e::10d0/64 fde6:7a:7d20:64e::1,ifconfig 10.10.78.210 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.14 15:51:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:51:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.78.1' . 2023.11.14 15:51:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:64e::1' . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:51:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:51:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:51:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:52 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:51:52 - OpenVPN > open_tun . 2023.11.14 15:51:52 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:51:52 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:51:52 - Disconnecting . 2023.11.14 15:51:52 - Routes, delete 89.249.74.215/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:51:52 - Routes, delete 89.249.74.215/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:51:52 - Connection terminated. I 2023.11.14 15:51:55 - Checking authorization ... . 2023.11.14 15:51:56 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:51:56 - Connecting to Alnitak (Serbia, Belgrade) . 2023.11.14 15:51:56 - Routes, add 152.89.160.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:51:56 - Routes, add 152.89.160.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:51:56 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:51:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:51:56 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:51:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:51:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:51:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:51:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:51:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]152.89.160.133:443 . 2023.11.14 15:51:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:51:56 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:51:56 - OpenVPN > UDP link remote: [AF_INET]152.89.160.133:443 . 2023.11.14 15:51:56 - OpenVPN > TLS: Initial packet from [AF_INET]152.89.160.133:443, sid=1e0e7783 34bd2c2f . 2023.11.14 15:51:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:51:57 - OpenVPN > VERIFY KU OK . 2023.11.14 15:51:57 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:51:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:51:57 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:51:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alnitak, emailAddress=info@airvpn.org . 2023.11.14 15:51:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:51:57 - OpenVPN > [Alnitak] Peer Connection Initiated with [AF_INET]152.89.160.133:443 . 2023.11.14 15:51:57 - OpenVPN > SENT CONTROL [Alnitak]: 'PUSH_REQUEST' (status=1) . 2023.11.14 15:51:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.142.1,dhcp-option DNS6 fde6:7a:7d20:78e::1,tun-ipv6,route-gateway 10.11.142.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:78e::1080/64 fde6:7a:7d20:78e::1,ifconfig 10.11.142.130 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.11.14 15:51:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:51:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.142.1' . 2023.11.14 15:51:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:78e::1' . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:51:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:51:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:51:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:51:57 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:51:57 - OpenVPN > open_tun . 2023.11.14 15:51:57 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:51:57 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:51:57 - Disconnecting . 2023.11.14 15:51:57 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:51:57 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:51:57 - Connection terminated. I 2023.11.14 15:52:01 - Checking authorization ... . 2023.11.14 15:52:01 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:01 - Connecting to Alshain (United Kingdom of Great Britain and Northern Ireland, London) . 2023.11.14 15:52:01 - Routes, add 217.151.98.165/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:01 - Routes, add 217.151.98.165/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:02 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:02 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.165:443 . 2023.11.14 15:52:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:02 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:02 - OpenVPN > UDP link remote: [AF_INET]217.151.98.165:443 . 2023.11.14 15:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.165:443, sid=5788a86b ca24db73 . 2023.11.14 15:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:02 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:02 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:02 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alshain, emailAddress=info@airvpn.org . 2023.11.14 15:52:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:02 - OpenVPN > [Alshain] Peer Connection Initiated with [AF_INET]217.151.98.165:443 . 2023.11.14 15:52:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.206.1,dhcp-option DNS6 fde6:7a:7d20:3ce::1,tun-ipv6,route-gateway 10.7.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3ce::10c6/64 fde6:7a:7d20:3ce::1,ifconfig 10.7.206.200 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:52:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:02 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.206.1' . 2023.11.14 15:52:02 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3ce::1' . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:02 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:02 - OpenVPN > open_tun . 2023.11.14 15:52:02 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:02 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:02 - Disconnecting . 2023.11.14 15:52:02 - Routes, delete 217.151.98.165/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:02 - Routes, delete 217.151.98.165/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:02 - Connection terminated. I 2023.11.14 15:52:05 - Checking authorization ... . 2023.11.14 15:52:06 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:52:09 - Checking authorization ... . 2023.11.14 15:52:10 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:10 - Connecting to Turais (Czechia, Prague) . 2023.11.14 15:52:10 - Routes, add 185.156.174.157/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:10 - Routes, add 185.156.174.157/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.174.157:443 . 2023.11.14 15:52:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:10 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:10 - OpenVPN > UDP link remote: [AF_INET]185.156.174.157:443 . 2023.11.14 15:52:10 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.174.157:443, sid=b6c83332 18613b89 . 2023.11.14 15:52:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:10 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:10 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:10 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Turais, emailAddress=info@airvpn.org . 2023.11.14 15:52:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:10 - OpenVPN > [Turais] Peer Connection Initiated with [AF_INET]185.156.174.157:443 . 2023.11.14 15:52:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.174.1,dhcp-option DNS6 fde6:7a:7d20:1bae::1,tun-ipv6,route-gateway 10.31.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bae::1050/64 fde6:7a:7d20:1bae::1,ifconfig 10.31.174.82 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:52:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.174.1' . 2023.11.14 15:52:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bae::1' . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:11 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:11 - OpenVPN > open_tun . 2023.11.14 15:52:11 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:11 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:11 - Disconnecting . 2023.11.14 15:52:11 - Routes, delete 185.156.174.157/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:11 - Routes, delete 185.156.174.157/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:11 - Connection terminated. I 2023.11.14 15:52:14 - Checking authorization ... . 2023.11.14 15:52:15 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:15 - Connecting to Mirzam (Germany, Frankfurt) . 2023.11.14 15:52:15 - Routes, add 141.98.102.181/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:15 - Routes, add 141.98.102.181/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.181:443 . 2023.11.14 15:52:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:15 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:15 - OpenVPN > UDP link remote: [AF_INET]141.98.102.181:443 . 2023.11.14 15:52:15 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.181:443, sid=3542c60e aeba29ec . 2023.11.14 15:52:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:15 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:15 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:15 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirzam, emailAddress=info@airvpn.org . 2023.11.14 15:52:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:15 - OpenVPN > [Mirzam] Peer Connection Initiated with [AF_INET]141.98.102.181:443 . 2023.11.14 15:52:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.206.1,dhcp-option DNS6 fde6:7a:7d20:18ce::1,tun-ipv6,route-gateway 10.28.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18ce::10f0/64 fde6:7a:7d20:18ce::1,ifconfig 10.28.206.242 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.14 15:52:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.206.1' . 2023.11.14 15:52:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18ce::1' . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:15 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:15 - OpenVPN > open_tun . 2023.11.14 15:52:15 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:15 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:15 - Disconnecting . 2023.11.14 15:52:16 - Routes, delete 141.98.102.181/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:16 - Routes, delete 141.98.102.181/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:16 - Connection terminated. I 2023.11.14 15:52:19 - Checking authorization ... . 2023.11.14 15:52:19 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:19 - Connecting to Taurus (Spain, Madrid) . 2023.11.14 15:52:20 - Routes, add 194.99.104.37/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:20 - Routes, add 194.99.104.37/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.99.104.37:443 . 2023.11.14 15:52:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:20 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:20 - OpenVPN > UDP link remote: [AF_INET]194.99.104.37:443 . 2023.11.14 15:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]194.99.104.37:443, sid=09f46a8d d166a798 . 2023.11.14 15:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:20 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:20 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:20 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Taurus, emailAddress=info@airvpn.org . 2023.11.14 15:52:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:20 - OpenVPN > [Taurus] Peer Connection Initiated with [AF_INET]194.99.104.37:443 . 2023.11.14 15:52:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.46.1,dhcp-option DNS6 fde6:7a:7d20:1d2e::1,tun-ipv6,route-gateway 10.33.46.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d2e::104b/64 fde6:7a:7d20:1d2e::1,ifconfig 10.33.46.77 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.11.14 15:52:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.46.1' . 2023.11.14 15:52:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d2e::1' . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:20 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:20 - OpenVPN > open_tun . 2023.11.14 15:52:20 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:20 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:20 - Disconnecting . 2023.11.14 15:52:21 - Routes, delete 194.99.104.37/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:21 - Routes, delete 194.99.104.37/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:21 - Connection terminated. I 2023.11.14 15:52:24 - Checking authorization ... . 2023.11.14 15:52:24 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:24 - Connecting to Geminorum (United Kingdom of Great Britain and Northern Ireland, London) . 2023.11.14 15:52:24 - Routes, add 2.58.47.205/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:25 - Routes, add 2.58.47.205/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]2.58.47.205:443 . 2023.11.14 15:52:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:25 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:25 - OpenVPN > UDP link remote: [AF_INET]2.58.47.205:443 . 2023.11.14 15:52:25 - OpenVPN > TLS: Initial packet from [AF_INET]2.58.47.205:443, sid=c6465670 b1aadfca . 2023.11.14 15:52:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:25 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:25 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:25 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Geminorum, emailAddress=info@airvpn.org . 2023.11.14 15:52:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:25 - OpenVPN > [Geminorum] Peer Connection Initiated with [AF_INET]2.58.47.205:443 . 2023.11.14 15:52:25 - OpenVPN > SENT CONTROL [Geminorum]: 'PUSH_REQUEST' (status=1) . 2023.11.14 15:52:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.46.1,dhcp-option DNS6 fde6:7a:7d20:b2e::1,tun-ipv6,route-gateway 10.15.46.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:b2e::10c3/64 fde6:7a:7d20:b2e::1,ifconfig 10.15.46.197 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.14 15:52:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.46.1' . 2023.11.14 15:52:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:b2e::1' . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:25 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:25 - OpenVPN > open_tun . 2023.11.14 15:52:25 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:25 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:25 - Disconnecting . 2023.11.14 15:52:25 - Routes, delete 2.58.47.205/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:25 - Routes, delete 2.58.47.205/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:25 - Connection terminated. I 2023.11.14 15:52:28 - Checking authorization ... . 2023.11.14 15:52:29 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:29 - Connecting to Intercrus (Germany, Frankfurt) . 2023.11.14 15:52:29 - Routes, add 178.162.204.236/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:29 - Routes, add 178.162.204.236/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:29 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:29 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.204.236:443 . 2023.11.14 15:52:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:29 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:29 - OpenVPN > UDP link remote: [AF_INET]178.162.204.236:443 . 2023.11.14 15:52:29 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.204.236:443, sid=59e6250a 6e01a557 . 2023.11.14 15:52:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:30 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:30 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:30 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Intercrus, emailAddress=info@airvpn.org . 2023.11.14 15:52:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:30 - OpenVPN > [Intercrus] Peer Connection Initiated with [AF_INET]178.162.204.236:443 . 2023.11.14 15:52:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.174.1,dhcp-option DNS6 fde6:7a:7d20:6ae::1,tun-ipv6,route-gateway 10.10.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6ae::108b/64 fde6:7a:7d20:6ae::1,ifconfig 10.10.174.141 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.11.14 15:52:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.174.1' . 2023.11.14 15:52:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6ae::1' . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:30 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:30 - OpenVPN > open_tun . 2023.11.14 15:52:30 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:30 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:30 - Disconnecting . 2023.11.14 15:52:30 - Routes, delete 178.162.204.236/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:30 - Routes, delete 178.162.204.236/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:30 - Connection terminated. I 2023.11.14 15:52:33 - Checking authorization ... . 2023.11.14 15:52:34 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:34 - Connecting to Dubhe (Germany, Frankfurt) . 2023.11.14 15:52:34 - Routes, add 141.98.102.245/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:34 - Routes, add 141.98.102.245/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443 . 2023.11.14 15:52:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:34 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:34 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443 . 2023.11.14 15:52:34 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=ea859607 709b6a13 . 2023.11.14 15:52:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:34 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:34 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:34 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org . 2023.11.14 15:52:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:34 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443 . 2023.11.14 15:52:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::10fb/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.253 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.14 15:52:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.14.1' . 2023.11.14 15:52:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:160e::1' . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:35 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:35 - OpenVPN > open_tun . 2023.11.14 15:52:35 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:35 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:35 - Disconnecting . 2023.11.14 15:52:35 - Routes, delete 141.98.102.245/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:35 - Routes, delete 141.98.102.245/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:35 - Connection terminated. I 2023.11.14 15:52:38 - Checking authorization ... . 2023.11.14 15:52:38 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:38 - Connecting to Veritate (Germany, Frankfurt) . 2023.11.14 15:52:39 - Routes, add 178.162.204.240/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:39 - Routes, add 178.162.204.240/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:39 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:39 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.204.240:443 . 2023.11.14 15:52:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:39 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:39 - OpenVPN > UDP link remote: [AF_INET]178.162.204.240:443 . 2023.11.14 15:52:39 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.204.240:443, sid=c1ded58f e22cfc51 . 2023.11.14 15:52:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:39 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:39 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:39 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Veritate, emailAddress=info@airvpn.org . 2023.11.14 15:52:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:39 - OpenVPN > [Veritate] Peer Connection Initiated with [AF_INET]178.162.204.240:443 . 2023.11.14 15:52:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.206.1,dhcp-option DNS6 fde6:7a:7d20:12ce::1,tun-ipv6,route-gateway 10.22.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12ce::1060/64 fde6:7a:7d20:12ce::1,ifconfig 10.22.206.98 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:52:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.206.1' . 2023.11.14 15:52:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12ce::1' . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:39 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:39 - OpenVPN > open_tun . 2023.11.14 15:52:39 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:39 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:39 - Disconnecting . 2023.11.14 15:52:40 - Routes, delete 178.162.204.240/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:40 - Routes, delete 178.162.204.240/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:40 - Connection terminated. I 2023.11.14 15:52:43 - Checking authorization ... . 2023.11.14 15:52:43 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:43 - Connecting to Errai (Germany, Frankfurt) . 2023.11.14 15:52:44 - Routes, add 185.189.112.13/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:44 - Routes, add 185.189.112.13/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:44 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:44 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:44 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.13:443 . 2023.11.14 15:52:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:44 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:44 - OpenVPN > UDP link remote: [AF_INET]185.189.112.13:443 . 2023.11.14 15:52:44 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.13:443, sid=59a8e92a 803177c4 . 2023.11.14 15:52:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:44 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:44 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:44 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2023.11.14 15:52:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:44 - OpenVPN > [Errai] Peer Connection Initiated with [AF_INET]185.189.112.13:443 . 2023.11.14 15:52:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.174.1,dhcp-option DNS6 fde6:7a:7d20:cae::1,tun-ipv6,route-gateway 10.16.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:cae::10dd/64 fde6:7a:7d20:cae::1,ifconfig 10.16.174.223 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:52:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.174.1' . 2023.11.14 15:52:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:cae::1' . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:44 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:44 - OpenVPN > open_tun . 2023.11.14 15:52:44 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:44 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:44 - Disconnecting . 2023.11.14 15:52:44 - Routes, delete 185.189.112.13/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:45 - Routes, delete 185.189.112.13/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:45 - Connection terminated. I 2023.11.14 15:52:48 - Checking authorization ... . 2023.11.14 15:52:48 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:48 - Connecting to Mesarthim (Germany, Munich) . 2023.11.14 15:52:48 - Routes, add 178.238.229.56/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:49 - Routes, add 178.238.229.56/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.238.229.56:443 . 2023.11.14 15:52:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:49 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:49 - OpenVPN > UDP link remote: [AF_INET]178.238.229.56:443 . 2023.11.14 15:52:49 - OpenVPN > TLS: Initial packet from [AF_INET]178.238.229.56:443, sid=cc17993a 958ebea9 . 2023.11.14 15:52:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:49 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:49 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:49 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mesarthim, emailAddress=info@airvpn.org . 2023.11.14 15:52:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:49 - OpenVPN > [Mesarthim] Peer Connection Initiated with [AF_INET]178.238.229.56:443 . 2023.11.14 15:52:49 - OpenVPN > SENT CONTROL [Mesarthim]: 'PUSH_REQUEST' (status=1) . 2023.11.14 15:52:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.110.1,dhcp-option DNS6 fde6:7a:7d20:126e::1,tun-ipv6,route-gateway 10.22.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:126e::1046/64 fde6:7a:7d20:126e::1,ifconfig 10.22.110.72 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.11.14 15:52:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.110.1' . 2023.11.14 15:52:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:126e::1' . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:49 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:49 - OpenVPN > open_tun . 2023.11.14 15:52:49 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:49 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:49 - Disconnecting . 2023.11.14 15:52:49 - Routes, delete 178.238.229.56/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:49 - Routes, delete 178.238.229.56/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:49 - Connection terminated. I 2023.11.14 15:52:53 - Checking authorization ... . 2023.11.14 15:52:53 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:53 - Connecting to Menkalinan (Germany, Frankfurt) . 2023.11.14 15:52:53 - Routes, add 141.98.102.229/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:53 - Routes, add 141.98.102.229/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:54 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:54 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:54 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443 . 2023.11.14 15:52:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:54 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:54 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443 . 2023.11.14 15:52:54 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=3db7a16c 34a53320 . 2023.11.14 15:52:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:54 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:54 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:54 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org . 2023.11.14 15:52:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:54 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443 . 2023.11.14 15:52:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.14.1,dhcp-option DNS6 fde6:7a:7d20:170e::1,tun-ipv6,route-gateway 10.27.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:170e::10de/64 fde6:7a:7d20:170e::1,ifconfig 10.27.14.224 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.14 15:52:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.14.1' . 2023.11.14 15:52:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:170e::1' . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:54 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:54 - OpenVPN > open_tun . 2023.11.14 15:52:54 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:54 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:54 - Disconnecting . 2023.11.14 15:52:54 - Routes, delete 141.98.102.229/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:54 - Routes, delete 141.98.102.229/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:54 - Connection terminated. I 2023.11.14 15:52:57 - Checking authorization ... . 2023.11.14 15:52:58 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:52:58 - Connecting to Zuben (Czechia, Prague) . 2023.11.14 15:52:58 - Routes, add 89.238.166.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:58 - Routes, add 89.238.166.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:52:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:52:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:52:58 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:52:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:52:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:52:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.238.166.237:443 . 2023.11.14 15:52:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:52:58 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:52:58 - OpenVPN > UDP link remote: [AF_INET]89.238.166.237:443 . 2023.11.14 15:52:58 - OpenVPN > TLS: Initial packet from [AF_INET]89.238.166.237:443, sid=9d6f0e9f 37e6e1ad . 2023.11.14 15:52:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:52:58 - OpenVPN > VERIFY KU OK . 2023.11.14 15:52:58 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:52:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:52:58 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:52:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Zuben, emailAddress=info@airvpn.org . 2023.11.14 15:52:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:52:58 - OpenVPN > [Zuben] Peer Connection Initiated with [AF_INET]89.238.166.237:443 . 2023.11.14 15:52:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.14.1,dhcp-option DNS6 fde6:7a:7d20:1d0e::1,tun-ipv6,route-gateway 10.33.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d0e::1046/64 fde6:7a:7d20:1d0e::1,ifconfig 10.33.14.72 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.14 15:52:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:52:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.14.1' . 2023.11.14 15:52:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d0e::1' . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:52:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:52:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:52:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:52:59 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:52:59 - OpenVPN > open_tun . 2023.11.14 15:52:59 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:52:59 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:52:59 - Disconnecting . 2023.11.14 15:52:59 - Routes, delete 89.238.166.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:52:59 - Routes, delete 89.238.166.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:52:59 - Connection terminated. I 2023.11.14 15:53:02 - Checking authorization ... . 2023.11.14 15:53:03 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:53:03 - Connecting to Alsephina (Germany, Frankfurt) . 2023.11.14 15:53:03 - Routes, add 141.98.102.189/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:03 - Routes, add 141.98.102.189/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:53:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:53:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:53:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:53:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.189:443 . 2023.11.14 15:53:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:53:03 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:53:03 - OpenVPN > UDP link remote: [AF_INET]141.98.102.189:443 . 2023.11.14 15:53:03 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.189:443, sid=5ebfaa33 f00a9593 . 2023.11.14 15:53:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:53:03 - OpenVPN > VERIFY KU OK . 2023.11.14 15:53:03 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:53:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:53:03 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:53:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alsephina, emailAddress=info@airvpn.org . 2023.11.14 15:53:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:53:03 - OpenVPN > [Alsephina] Peer Connection Initiated with [AF_INET]141.98.102.189:443 . 2023.11.14 15:53:04 - OpenVPN > SENT CONTROL [Alsephina]: 'PUSH_REQUEST' (status=1) . 2023.11.14 15:53:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.110.1,dhcp-option DNS6 fde6:7a:7d20:156e::1,tun-ipv6,route-gateway 10.25.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:156e::1003/64 fde6:7a:7d20:156e::1,ifconfig 10.25.110.5 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:53:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:53:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.110.1' . 2023.11.14 15:53:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:156e::1' . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:53:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:53:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:53:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:06 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:53:06 - OpenVPN > open_tun . 2023.11.14 15:53:06 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:53:06 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:53:06 - Disconnecting . 2023.11.14 15:53:06 - Routes, delete 141.98.102.189/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:06 - Routes, delete 141.98.102.189/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:53:06 - Connection terminated. I 2023.11.14 15:53:09 - Checking authorization ... . 2023.11.14 15:53:10 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:53:10 - Connecting to Adhara (Germany, Frankfurt) . 2023.11.14 15:53:10 - Routes, add 185.104.184.45/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:10 - Routes, add 185.104.184.45/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:53:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:53:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:53:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:53:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2023.11.14 15:53:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:53:10 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:53:10 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2023.11.14 15:53:10 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=181097a0 11295113 . 2023.11.14 15:53:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:53:10 - OpenVPN > VERIFY KU OK . 2023.11.14 15:53:10 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:53:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:53:10 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:53:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2023.11.14 15:53:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:53:10 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2023.11.14 15:53:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.174.1,dhcp-option DNS6 fde6:7a:7d20:ae::1,tun-ipv6,route-gateway 10.4.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ae::107b/64 fde6:7a:7d20:ae::1,ifconfig 10.4.174.125 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.14 15:53:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:53:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.174.1' . 2023.11.14 15:53:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:ae::1' . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:53:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:53:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:53:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:11 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:53:11 - OpenVPN > open_tun . 2023.11.14 15:53:11 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:53:11 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:53:11 - Disconnecting . 2023.11.14 15:53:11 - Routes, delete 185.104.184.45/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:11 - Routes, delete 185.104.184.45/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:53:11 - Connection terminated. I 2023.11.14 15:53:14 - Checking authorization ... . 2023.11.14 15:53:15 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:53:15 - Connecting to Mekbuda (Spain, Madrid) . 2023.11.14 15:53:15 - Routes, add 185.93.182.173/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:15 - Routes, add 185.93.182.173/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:53:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:53:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:53:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:53:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.93.182.173:443 . 2023.11.14 15:53:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:53:15 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:53:15 - OpenVPN > UDP link remote: [AF_INET]185.93.182.173:443 . 2023.11.14 15:53:15 - OpenVPN > TLS: Initial packet from [AF_INET]185.93.182.173:443, sid=448a081d 5c0158bd . 2023.11.14 15:53:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:53:15 - OpenVPN > VERIFY KU OK . 2023.11.14 15:53:15 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:53:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:53:15 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:53:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mekbuda, emailAddress=info@airvpn.org . 2023.11.14 15:53:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:53:15 - OpenVPN > [Mekbuda] Peer Connection Initiated with [AF_INET]185.93.182.173:443 . 2023.11.14 15:53:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.206.1,dhcp-option DNS6 fde6:7a:7d20:11ce::1,tun-ipv6,route-gateway 10.21.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11ce::10d2/64 fde6:7a:7d20:11ce::1,ifconfig 10.21.206.212 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.14 15:53:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:53:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.206.1' . 2023.11.14 15:53:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11ce::1' . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:53:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:53:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:53:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:53:16 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:53:16 - OpenVPN > open_tun . 2023.11.14 15:53:16 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:53:16 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:53:16 - Disconnecting . 2023.11.14 15:53:16 - Routes, delete 185.93.182.173/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:16 - Routes, delete 185.93.182.173/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:53:16 - Connection terminated. I 2023.11.14 15:53:19 - Checking authorization ... . 2023.11.14 15:53:20 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:23 - Checking authorization ... . 2023.11.14 15:53:23 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:26 - Checking authorization ... . 2023.11.14 15:53:27 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:30 - Checking authorization ... . 2023.11.14 15:53:30 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:33 - Checking authorization ... . 2023.11.14 15:53:34 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:37 - Checking authorization ... . 2023.11.14 15:53:37 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:40 - Checking authorization ... . 2023.11.14 15:53:41 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:44 - Checking authorization ... . 2023.11.14 15:53:44 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:48 - Checking authorization ... . 2023.11.14 15:53:48 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:51 - Checking authorization ... . 2023.11.14 15:53:52 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:55 - Checking authorization ... . 2023.11.14 15:53:55 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" I 2023.11.14 15:53:58 - Checking authorization ... . 2023.11.14 15:53:59 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:53:59 - Connecting to Alathfar (United Kingdom of Great Britain and Northern Ireland, London) . 2023.11.14 15:53:59 - Routes, add 217.138.195.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:53:59 - Routes, add 217.138.195.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:53:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:53:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:53:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:53:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:53:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:53:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.138.195.21:443 . 2023.11.14 15:53:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:53:59 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:53:59 - OpenVPN > UDP link remote: [AF_INET]217.138.195.21:443 . 2023.11.14 15:53:59 - OpenVPN > TLS: Initial packet from [AF_INET]217.138.195.21:443, sid=778fde79 599084f8 . 2023.11.14 15:54:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:54:00 - OpenVPN > VERIFY KU OK . 2023.11.14 15:54:00 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:54:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:54:00 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:54:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alathfar, emailAddress=info@airvpn.org . 2023.11.14 15:54:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:54:00 - OpenVPN > [Alathfar] Peer Connection Initiated with [AF_INET]217.138.195.21:443 . 2023.11.14 15:54:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.46.1,dhcp-option DNS6 fde6:7a:7d20:12e::1,tun-ipv6,route-gateway 10.5.46.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e::10f4/64 fde6:7a:7d20:12e::1,ifconfig 10.5.46.246 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.14 15:54:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:54:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.46.1' . 2023.11.14 15:54:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e::1' . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:54:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:54:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:54:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:00 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:54:00 - OpenVPN > open_tun . 2023.11.14 15:54:00 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:54:00 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:54:00 - Disconnecting . 2023.11.14 15:54:00 - Routes, delete 217.138.195.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:54:00 - Routes, delete 217.138.195.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:54:00 - Connection terminated. I 2023.11.14 15:54:03 - Checking authorization ... . 2023.11.14 15:54:04 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:54:04 - Connecting to Ogma (Germany, Frankfurt) . 2023.11.14 15:54:04 - Routes, add 185.189.112.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:54:04 - Routes, add 185.189.112.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:54:04 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:54:04 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:54:04 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:54:04 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:54:04 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:54:04 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:54:04 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:54:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.21:443 . 2023.11.14 15:54:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:54:04 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:54:04 - OpenVPN > UDP link remote: [AF_INET]185.189.112.21:443 . 2023.11.14 15:54:04 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.21:443, sid=1ef77fdf c8b4cd6b . 2023.11.14 15:54:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:54:04 - OpenVPN > VERIFY KU OK . 2023.11.14 15:54:04 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:54:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:54:04 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:54:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ogma, emailAddress=info@airvpn.org . 2023.11.14 15:54:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:54:04 - OpenVPN > [Ogma] Peer Connection Initiated with [AF_INET]185.189.112.21:443 . 2023.11.14 15:54:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.174.1,dhcp-option DNS6 fde6:7a:7d20:15ae::1,tun-ipv6,route-gateway 10.25.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15ae::10f8/64 fde6:7a:7d20:15ae::1,ifconfig 10.25.174.250 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.14 15:54:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:54:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.174.1' . 2023.11.14 15:54:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:15ae::1' . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:54:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:54:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:54:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:04 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:54:04 - OpenVPN > open_tun . 2023.11.14 15:54:04 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:54:04 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:54:04 - Disconnecting . 2023.11.14 15:54:05 - Routes, delete 185.189.112.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:54:05 - Routes, delete 185.189.112.21/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:54:05 - Connection terminated. I 2023.11.14 15:54:08 - Checking authorization ... . 2023.11.14 15:54:08 - Using WinTun network interface "NordLynx (NordLynx Tunnel)" ! 2023.11.14 15:54:08 - Connecting to Centaurus (Czechia, Prague) . 2023.11.14 15:54:09 - Routes, add 185.156.174.117/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:54:09 - Routes, add 185.156.174.117/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2023.11.14 15:54:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.14 15:54:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.14 15:54:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.14 15:54:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:54:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:54:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.14 15:54:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.14 15:54:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.174.117:443 . 2023.11.14 15:54:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.14 15:54:09 - OpenVPN > UDP link local: (not bound) . 2023.11.14 15:54:09 - OpenVPN > UDP link remote: [AF_INET]185.156.174.117:443 . 2023.11.14 15:54:09 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.174.117:443, sid=c8713247 caed7640 . 2023.11.14 15:54:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.14 15:54:09 - OpenVPN > VERIFY KU OK . 2023.11.14 15:54:09 - OpenVPN > Validating certificate extended key usage . 2023.11.14 15:54:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.14 15:54:09 - OpenVPN > VERIFY EKU OK . 2023.11.14 15:54:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Centaurus, emailAddress=info@airvpn.org . 2023.11.14 15:54:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.14 15:54:09 - OpenVPN > [Centaurus] Peer Connection Initiated with [AF_INET]185.156.174.117:443 . 2023.11.14 15:54:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.78.1,dhcp-option DNS6 fde6:7a:7d20:94e::1,tun-ipv6,route-gateway 10.13.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:94e::1087/64 fde6:7a:7d20:94e::1,ifconfig 10.13.78.137 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.14 15:54:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.14 15:54:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.78.1' . 2023.11.14 15:54:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:94e::1' . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.14 15:54:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.14 15:54:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.14 15:54:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.14 15:54:09 - OpenVPN > interactive service msg_channel=0 . 2023.11.14 15:54:09 - OpenVPN > open_tun . 2023.11.14 15:54:09 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.11.14 15:54:09 - OpenVPN > Exiting due to fatal error ! 2023.11.14 15:54:09 - Disconnecting . 2023.11.14 15:54:10 - Routes, delete 185.156.174.117/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2023.11.14 15:54:10 - Routes, delete 185.156.174.117/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2023.11.14 15:54:10 - Connection terminated. I 2023.11.14 15:54:12 - Cancel requested. ! 2023.11.14 15:54:12 - Session terminated.