. 2023.11.29 18:14:45 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.11.29 18:14:45 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.11.29 18:14:45 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.11.29 18:14:46 - Ready . 2023.11.29 18:14:46 - Collect information about AirVPN completed I 2023.11.29 18:15:06 - Session starting. I 2023.11.29 18:15:18 - Checking authorization ... . 2023.11.29 18:15:19 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:19 - Connecting to Cepheus (Norway, Oslo) . 2023.11.29 18:15:19 - Routes, add 82.102.27.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:19 - Routes, add 82.102.27.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.27.173:443 . 2023.11.29 18:15:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:19 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:19 - OpenVPN > UDP link remote: [AF_INET]82.102.27.173:443 . 2023.11.29 18:15:19 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.27.173:443, sid=9e26af80 7c24948b . 2023.11.29 18:15:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:20 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:20 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:20 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cepheus, emailAddress=info@airvpn.org . 2023.11.29 18:15:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:20 - OpenVPN > [Cepheus] Peer Connection Initiated with [AF_INET]82.102.27.173:443 . 2023.11.29 18:15:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.158.1,dhcp-option DNS6 fde6:7a:7d20:99e::1,tun-ipv6,route-gateway 10.13.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:99e::1071/64 fde6:7a:7d20:99e::1,ifconfig 10.13.158.115 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.29 18:15:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.158.1' . 2023.11.29 18:15:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:99e::1' . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:20 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:20 - OpenVPN > open_tun . 2023.11.29 18:15:20 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:20 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:20 - Disconnecting . 2023.11.29 18:15:20 - Routes, delete 82.102.27.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:20 - Routes, delete 82.102.27.173/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:20 - Connection terminated. I 2023.11.29 18:15:23 - Checking authorization ... . 2023.11.29 18:15:24 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:24 - Connecting to Suhail (Netherlands, Alblasserdam) . 2023.11.29 18:15:24 - Routes, add 134.19.179.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:24 - Routes, add 134.19.179.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.189:443 . 2023.11.29 18:15:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:24 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:24 - OpenVPN > UDP link remote: [AF_INET]134.19.179.189:443 . 2023.11.29 18:15:24 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.189:443, sid=05b8cadd 35e9196d . 2023.11.29 18:15:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:24 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:24 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:24 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Suhail, emailAddress=info@airvpn.org . 2023.11.29 18:15:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:24 - OpenVPN > [Suhail] Peer Connection Initiated with [AF_INET]134.19.179.189:443 . 2023.11.29 18:15:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.158.1,dhcp-option DNS6 fde6:7a:7d20:1e9e::1,tun-ipv6,route-gateway 10.34.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e9e::1054/64 fde6:7a:7d20:1e9e::1,ifconfig 10.34.158.86 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.29 18:15:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.158.1' . 2023.11.29 18:15:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1e9e::1' . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:25 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:25 - OpenVPN > open_tun . 2023.11.29 18:15:25 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:25 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:25 - Disconnecting . 2023.11.29 18:15:25 - Routes, delete 134.19.179.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:25 - Routes, delete 134.19.179.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:25 - Connection terminated. I 2023.11.29 18:15:28 - Checking authorization ... . 2023.11.29 18:15:29 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:29 - Connecting to Canis (Netherlands, Alblasserdam) . 2023.11.29 18:15:29 - Routes, add 213.152.161.221/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:29 - Routes, add 213.152.161.221/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:29 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:29 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.221:443 . 2023.11.29 18:15:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:29 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:29 - OpenVPN > UDP link remote: [AF_INET]213.152.161.221:443 . 2023.11.29 18:15:29 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.221:443, sid=63dabab0 f2987576 . 2023.11.29 18:15:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:29 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:29 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:29 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Canis, emailAddress=info@airvpn.org . 2023.11.29 18:15:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:29 - OpenVPN > [Canis] Peer Connection Initiated with [AF_INET]213.152.161.221:443 . 2023.11.29 18:15:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.126.1,dhcp-option DNS6 fde6:7a:7d20:87e::1,tun-ipv6,route-gateway 10.12.126.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:87e::1067/64 fde6:7a:7d20:87e::1,ifconfig 10.12.126.105 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.11.29 18:15:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.126.1' . 2023.11.29 18:15:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:87e::1' . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:29 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:29 - OpenVPN > open_tun . 2023.11.29 18:15:29 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:29 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:29 - Disconnecting . 2023.11.29 18:15:30 - Routes, delete 213.152.161.221/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:30 - Routes, delete 213.152.161.221/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:30 - Connection terminated. I 2023.11.29 18:15:33 - Checking authorization ... . 2023.11.29 18:15:33 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:33 - Connecting to Alrai (Netherlands, Alblasserdam) . 2023.11.29 18:15:34 - Routes, add 213.152.162.81/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:34 - Routes, add 213.152.162.81/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.81:443 . 2023.11.29 18:15:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:34 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:34 - OpenVPN > UDP link remote: [AF_INET]213.152.162.81:443 . 2023.11.29 18:15:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.81:443, sid=92c83fc1 7216b97e . 2023.11.29 18:15:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:34 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:34 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:34 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alrai, emailAddress=info@airvpn.org . 2023.11.29 18:15:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:34 - OpenVPN > [Alrai] Peer Connection Initiated with [AF_INET]213.152.162.81:443 . 2023.11.29 18:15:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.158.1,dhcp-option DNS6 fde6:7a:7d20:39e::1,tun-ipv6,route-gateway 10.7.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:39e::1099/64 fde6:7a:7d20:39e::1,ifconfig 10.7.158.155 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.29 18:15:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.158.1' . 2023.11.29 18:15:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:39e::1' . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:34 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:34 - OpenVPN > open_tun . 2023.11.29 18:15:34 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:34 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:34 - Disconnecting . 2023.11.29 18:15:34 - Routes, delete 213.152.162.81/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:35 - Routes, delete 213.152.162.81/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:35 - Connection terminated. I 2023.11.29 18:15:38 - Checking authorization ... . 2023.11.29 18:15:38 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:38 - Connecting to Eltanin (Netherlands, Alblasserdam) . 2023.11.29 18:15:39 - Routes, add 134.19.179.149/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:39 - Routes, add 134.19.179.149/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:39 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:39 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.149:443 . 2023.11.29 18:15:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:39 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:39 - OpenVPN > UDP link remote: [AF_INET]134.19.179.149:443 . 2023.11.29 18:15:39 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.149:443, sid=ce2da473 3314b84e . 2023.11.29 18:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:39 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:39 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:39 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Eltanin, emailAddress=info@airvpn.org . 2023.11.29 18:15:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:39 - OpenVPN > [Eltanin] Peer Connection Initiated with [AF_INET]134.19.179.149:443 . 2023.11.29 18:15:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.222.1,dhcp-option DNS6 fde6:7a:7d20:1dde::1,tun-ipv6,route-gateway 10.33.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1dde::10cc/64 fde6:7a:7d20:1dde::1,ifconfig 10.33.222.206 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.29 18:15:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.222.1' . 2023.11.29 18:15:39 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1dde::1' . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:39 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:39 - OpenVPN > open_tun . 2023.11.29 18:15:39 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:39 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:39 - Disconnecting . 2023.11.29 18:15:39 - Routes, delete 134.19.179.149/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:40 - Routes, delete 134.19.179.149/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:40 - Connection terminated. I 2023.11.29 18:15:43 - Checking authorization ... . 2023.11.29 18:15:43 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:43 - Connecting to Larawag (Netherlands, Alblasserdam) . 2023.11.29 18:15:44 - Routes, add 134.19.179.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:44 - Routes, add 134.19.179.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:44 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:44 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:44 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.181:443 . 2023.11.29 18:15:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:44 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:44 - OpenVPN > UDP link remote: [AF_INET]134.19.179.181:443 . 2023.11.29 18:15:44 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.181:443, sid=7cffd508 62805443 . 2023.11.29 18:15:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:44 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:44 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:44 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Larawag, emailAddress=info@airvpn.org . 2023.11.29 18:15:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:44 - OpenVPN > [Larawag] Peer Connection Initiated with [AF_INET]134.19.179.181:443 . 2023.11.29 18:15:44 - OpenVPN > SENT CONTROL [Larawag]: 'PUSH_REQUEST' (status=1) . 2023.11.29 18:15:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.254.1,dhcp-option DNS6 fde6:7a:7d20:1dfe::1,tun-ipv6,route-gateway 10.33.254.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1dfe::10de/64 fde6:7a:7d20:1dfe::1,ifconfig 10.33.254.224 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.11.29 18:15:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.254.1' . 2023.11.29 18:15:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1dfe::1' . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:44 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:44 - OpenVPN > open_tun . 2023.11.29 18:15:44 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:44 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:44 - Disconnecting . 2023.11.29 18:15:44 - Routes, delete 134.19.179.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:44 - Routes, delete 134.19.179.181/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:44 - Connection terminated. I 2023.11.29 18:15:48 - Checking authorization ... . 2023.11.29 18:15:48 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:48 - Connecting to Celaeno (Netherlands, Alblasserdam) . 2023.11.29 18:15:48 - Routes, add 213.152.161.71/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:48 - Routes, add 213.152.161.71/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.71:443 . 2023.11.29 18:15:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:49 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:49 - OpenVPN > UDP link remote: [AF_INET]213.152.161.71:443 . 2023.11.29 18:15:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.71:443, sid=7a569fde 3930a9cd . 2023.11.29 18:15:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:49 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:49 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:49 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Celaeno, emailAddress=info@airvpn.org . 2023.11.29 18:15:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:49 - OpenVPN > [Celaeno] Peer Connection Initiated with [AF_INET]213.152.161.71:443 . 2023.11.29 18:15:49 - OpenVPN > SENT CONTROL [Celaeno]: 'PUSH_REQUEST' (status=1) . 2023.11.29 18:15:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.62.1,dhcp-option DNS6 fde6:7a:7d20:93e::1,tun-ipv6,route-gateway 10.13.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:93e::106f/64 fde6:7a:7d20:93e::1,ifconfig 10.13.62.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.29 18:15:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.62.1' . 2023.11.29 18:15:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:93e::1' . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:49 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:49 - OpenVPN > open_tun . 2023.11.29 18:15:49 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:49 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:49 - Disconnecting . 2023.11.29 18:15:49 - Routes, delete 213.152.161.71/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:49 - Routes, delete 213.152.161.71/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:49 - Connection terminated. I 2023.11.29 18:15:52 - Checking authorization ... . 2023.11.29 18:15:53 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:53 - Connecting to Edasich (Netherlands, Alblasserdam) . 2023.11.29 18:15:53 - Routes, add 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:53 - Routes, add 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.213:443 . 2023.11.29 18:15:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:53 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:53 - OpenVPN > UDP link remote: [AF_INET]213.152.161.213:443 . 2023.11.29 18:15:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.213:443, sid=064d18f6 978ae90b . 2023.11.29 18:15:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:53 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:53 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:53 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Edasich, emailAddress=info@airvpn.org . 2023.11.29 18:15:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:53 - OpenVPN > [Edasich] Peer Connection Initiated with [AF_INET]213.152.161.213:443 . 2023.11.29 18:15:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.30.1,dhcp-option DNS6 fde6:7a:7d20:c1e::1,tun-ipv6,route-gateway 10.16.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c1e::1019/64 fde6:7a:7d20:c1e::1,ifconfig 10.16.30.27 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.11.29 18:15:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.30.1' . 2023.11.29 18:15:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c1e::1' . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:54 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:54 - OpenVPN > open_tun . 2023.11.29 18:15:54 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:54 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:54 - Disconnecting . 2023.11.29 18:15:54 - Routes, delete 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:54 - Routes, delete 213.152.161.213/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:54 - Connection terminated. I 2023.11.29 18:15:57 - Checking authorization ... . 2023.11.29 18:15:58 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:15:58 - Connecting to Salm (Netherlands, Alblasserdam) . 2023.11.29 18:15:58 - Routes, add 213.152.161.22/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:58 - Routes, add 213.152.161.22/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:15:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:15:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:15:58 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:15:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:15:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:15:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.22:443 . 2023.11.29 18:15:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:15:58 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:15:58 - OpenVPN > UDP link remote: [AF_INET]213.152.161.22:443 . 2023.11.29 18:15:58 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.22:443, sid=6e756dcd f24e20fb . 2023.11.29 18:15:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:15:58 - OpenVPN > VERIFY KU OK . 2023.11.29 18:15:58 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:15:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:15:58 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:15:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Salm, emailAddress=info@airvpn.org . 2023.11.29 18:15:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:15:58 - OpenVPN > [Salm] Peer Connection Initiated with [AF_INET]213.152.161.22:443 . 2023.11.29 18:15:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.30.1,dhcp-option DNS6 fde6:7a:7d20:191e::1,tun-ipv6,route-gateway 10.29.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:191e::10d8/64 fde6:7a:7d20:191e::1,ifconfig 10.29.30.218 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.29 18:15:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:15:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.30.1' . 2023.11.29 18:15:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:191e::1' . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:15:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:15:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:15:59 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:15:59 - OpenVPN > open_tun . 2023.11.29 18:15:59 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:15:59 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:15:59 - Disconnecting . 2023.11.29 18:15:59 - Routes, delete 213.152.161.22/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:15:59 - Routes, delete 213.152.161.22/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:15:59 - Connection terminated. I 2023.11.29 18:16:02 - Checking authorization ... . 2023.11.29 18:16:03 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:03 - Connecting to Piscium (Netherlands, Alblasserdam) . 2023.11.29 18:16:03 - Routes, add 134.19.179.133/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:03 - Routes, add 134.19.179.133/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.133:443 . 2023.11.29 18:16:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:03 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:03 - OpenVPN > UDP link remote: [AF_INET]134.19.179.133:443 . 2023.11.29 18:16:03 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.133:443, sid=93e205ea a8008aa1 . 2023.11.29 18:16:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:03 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:03 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:03 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Piscium, emailAddress=info@airvpn.org . 2023.11.29 18:16:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:03 - OpenVPN > [Piscium] Peer Connection Initiated with [AF_INET]134.19.179.133:443 . 2023.11.29 18:16:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.94.1,dhcp-option DNS6 fde6:7a:7d20:1e5e::1,tun-ipv6,route-gateway 10.34.94.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e5e::104d/64 fde6:7a:7d20:1e5e::1,ifconfig 10.34.94.79 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.29 18:16:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.94.1' . 2023.11.29 18:16:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1e5e::1' . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:03 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:03 - OpenVPN > open_tun . 2023.11.29 18:16:03 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:03 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:03 - Disconnecting . 2023.11.29 18:16:04 - Routes, delete 134.19.179.133/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:04 - Routes, delete 134.19.179.133/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:04 - Connection terminated. I 2023.11.29 18:16:07 - Checking authorization ... . 2023.11.29 18:16:07 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:07 - Connecting to Jabbah (Netherlands, Alblasserdam) . 2023.11.29 18:16:08 - Routes, add 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:08 - Routes, add 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.26:443 . 2023.11.29 18:16:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:08 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:08 - OpenVPN > UDP link remote: [AF_INET]213.152.186.26:443 . 2023.11.29 18:16:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.26:443, sid=4b78d04e c72c7016 . 2023.11.29 18:16:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:08 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:08 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:08 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Jabbah, emailAddress=info@airvpn.org . 2023.11.29 18:16:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:08 - OpenVPN > [Jabbah] Peer Connection Initiated with [AF_INET]213.152.186.26:443 . 2023.11.29 18:16:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.222.1,dhcp-option DNS6 fde6:7a:7d20:fde::1,tun-ipv6,route-gateway 10.19.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fde::1008/64 fde6:7a:7d20:fde::1,ifconfig 10.19.222.10 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.29 18:16:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.222.1' . 2023.11.29 18:16:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fde::1' . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:08 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:08 - OpenVPN > open_tun . 2023.11.29 18:16:08 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:08 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:08 - Disconnecting . 2023.11.29 18:16:09 - Routes, delete 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:09 - Routes, delete 213.152.186.26/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:09 - Connection terminated. I 2023.11.29 18:16:12 - Checking authorization ... . 2023.11.29 18:16:12 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:12 - Connecting to Alphard (Netherlands, Alblasserdam) . 2023.11.29 18:16:13 - Routes, add 213.152.187.202/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:13 - Routes, add 213.152.187.202/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.202:443 . 2023.11.29 18:16:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:13 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:13 - OpenVPN > UDP link remote: [AF_INET]213.152.187.202:443 . 2023.11.29 18:16:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.202:443, sid=0f0265c9 0811d1b2 . 2023.11.29 18:16:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:13 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:13 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:13 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphard, emailAddress=info@airvpn.org . 2023.11.29 18:16:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:13 - OpenVPN > [Alphard] Peer Connection Initiated with [AF_INET]213.152.187.202:443 . 2023.11.29 18:16:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.62.1,dhcp-option DNS6 fde6:7a:7d20:33e::1,tun-ipv6,route-gateway 10.7.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:33e::1069/64 fde6:7a:7d20:33e::1,ifconfig 10.7.62.107 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.11.29 18:16:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.7.62.1' . 2023.11.29 18:16:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:33e::1' . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:13 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:13 - OpenVPN > open_tun . 2023.11.29 18:16:13 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:13 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:13 - Disconnecting . 2023.11.29 18:16:13 - Routes, delete 213.152.187.202/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:14 - Routes, delete 213.152.187.202/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:14 - Connection terminated. I 2023.11.29 18:16:17 - Checking authorization ... . 2023.11.29 18:16:17 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:17 - Connecting to Chara (Netherlands, Alblasserdam) . 2023.11.29 18:16:18 - Routes, add 213.152.187.222/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:18 - Routes, add 213.152.187.222/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.222:443 . 2023.11.29 18:16:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:18 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:18 - OpenVPN > UDP link remote: [AF_INET]213.152.187.222:443 . 2023.11.29 18:16:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.222:443, sid=4bed7acf 05cea6bd . 2023.11.29 18:16:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:18 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:18 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:18 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chara, emailAddress=info@airvpn.org . 2023.11.29 18:16:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:18 - OpenVPN > [Chara] Peer Connection Initiated with [AF_INET]213.152.187.222:443 . 2023.11.29 18:16:18 - OpenVPN > SENT CONTROL [Chara]: 'PUSH_REQUEST' (status=1) . 2023.11.29 18:16:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.30.1,dhcp-option DNS6 fde6:7a:7d20:a1e::1,tun-ipv6,route-gateway 10.14.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a1e::1023/64 fde6:7a:7d20:a1e::1,ifconfig 10.14.30.37 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.11.29 18:16:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.30.1' . 2023.11.29 18:16:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a1e::1' . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:18 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:18 - OpenVPN > open_tun . 2023.11.29 18:16:18 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:18 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:18 - Disconnecting . 2023.11.29 18:16:18 - Routes, delete 213.152.187.222/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:18 - Routes, delete 213.152.187.222/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:18 - Connection terminated. I 2023.11.29 18:16:22 - Checking authorization ... . 2023.11.29 18:16:22 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:22 - Connecting to Caph (Netherlands, Alblasserdam) . 2023.11.29 18:16:22 - Routes, add 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:23 - Routes, add 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:23 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:23 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.172:443 . 2023.11.29 18:16:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:23 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:23 - OpenVPN > UDP link remote: [AF_INET]213.152.162.172:443 . 2023.11.29 18:16:23 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.172:443, sid=877c528d cce80cdb . 2023.11.29 18:16:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:23 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:23 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:23 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Caph, emailAddress=info@airvpn.org . 2023.11.29 18:16:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:23 - OpenVPN > [Caph] Peer Connection Initiated with [AF_INET]213.152.162.172:443 . 2023.11.29 18:16:23 - OpenVPN > SENT CONTROL [Caph]: 'PUSH_REQUEST' (status=1) . 2023.11.29 18:16:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.158.1,dhcp-option DNS6 fde6:7a:7d20:89e::1,tun-ipv6,route-gateway 10.12.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:89e::10d2/64 fde6:7a:7d20:89e::1,ifconfig 10.12.158.212 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.29 18:16:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.158.1' . 2023.11.29 18:16:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:89e::1' . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:23 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:23 - OpenVPN > open_tun . 2023.11.29 18:16:23 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:23 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:23 - Disconnecting . 2023.11.29 18:16:23 - Routes, delete 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:24 - Routes, delete 213.152.162.172/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:24 - Connection terminated. I 2023.11.29 18:16:27 - Checking authorization ... . 2023.11.29 18:16:27 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:27 - Connecting to Ophiuchus (Norway, Oslo) . 2023.11.29 18:16:27 - Routes, add 185.206.225.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:28 - Routes, add 185.206.225.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.206.225.61:443 . 2023.11.29 18:16:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:28 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:28 - OpenVPN > UDP link remote: [AF_INET]185.206.225.61:443 . 2023.11.29 18:16:28 - OpenVPN > TLS: Initial packet from [AF_INET]185.206.225.61:443, sid=2f310f12 fbedf3c8 . 2023.11.29 18:16:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:28 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:28 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:28 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ophiuchus, emailAddress=info@airvpn.org . 2023.11.29 18:16:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:28 - OpenVPN > [Ophiuchus] Peer Connection Initiated with [AF_INET]185.206.225.61:443 . 2023.11.29 18:16:28 - OpenVPN > SENT CONTROL [Ophiuchus]: 'PUSH_REQUEST' (status=1) . 2023.11.29 18:16:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.222.1,dhcp-option DNS6 fde6:7a:7d20:15de::1,tun-ipv6,route-gateway 10.25.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15de::1033/64 fde6:7a:7d20:15de::1,ifconfig 10.25.222.53 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2023.11.29 18:16:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.222.1' . 2023.11.29 18:16:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:15de::1' . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:28 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:28 - OpenVPN > open_tun . 2023.11.29 18:16:28 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:28 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:28 - Disconnecting . 2023.11.29 18:16:28 - Routes, delete 185.206.225.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:28 - Routes, delete 185.206.225.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:28 - Connection terminated. I 2023.11.29 18:16:31 - Checking authorization ... . 2023.11.29 18:16:32 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:32 - Connecting to Elnath (Netherlands, Alblasserdam) . 2023.11.29 18:16:32 - Routes, add 213.152.186.42/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:32 - Routes, add 213.152.186.42/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.42:443 . 2023.11.29 18:16:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:33 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:33 - OpenVPN > UDP link remote: [AF_INET]213.152.186.42:443 . 2023.11.29 18:16:33 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.42:443, sid=054a735e 2a1ab62e . 2023.11.29 18:16:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:33 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:33 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:33 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Elnath, emailAddress=info@airvpn.org . 2023.11.29 18:16:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:33 - OpenVPN > [Elnath] Peer Connection Initiated with [AF_INET]213.152.186.42:443 . 2023.11.29 18:16:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.62.1,dhcp-option DNS6 fde6:7a:7d20:c3e::1,tun-ipv6,route-gateway 10.16.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c3e::10ec/64 fde6:7a:7d20:c3e::1,ifconfig 10.16.62.238 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.11.29 18:16:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.62.1' . 2023.11.29 18:16:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c3e::1' . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:33 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:33 - OpenVPN > open_tun . 2023.11.29 18:16:33 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:33 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:33 - Disconnecting . 2023.11.29 18:16:33 - Routes, delete 213.152.186.42/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:33 - Routes, delete 213.152.186.42/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:33 - Connection terminated. I 2023.11.29 18:16:36 - Checking authorization ... . 2023.11.29 18:16:37 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:37 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2023.11.29 18:16:37 - Routes, add 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:37 - Routes, add 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.135:443 . 2023.11.29 18:16:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:37 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:37 - OpenVPN > UDP link remote: [AF_INET]213.152.161.135:443 . 2023.11.29 18:16:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.135:443, sid=a4b6dee4 3cf994ae . 2023.11.29 18:16:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:38 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:38 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:38 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org . 2023.11.29 18:16:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:38 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.135:443 . 2023.11.29 18:16:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.62.1,dhcp-option DNS6 fde6:7a:7d20:1b3e::1,tun-ipv6,route-gateway 10.31.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b3e::10f7/64 fde6:7a:7d20:1b3e::1,ifconfig 10.31.62.249 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.29 18:16:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.62.1' . 2023.11.29 18:16:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b3e::1' . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:38 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:38 - OpenVPN > open_tun . 2023.11.29 18:16:38 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:38 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:38 - Disconnecting . 2023.11.29 18:16:38 - Routes, delete 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:38 - Routes, delete 213.152.161.135/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:38 - Connection terminated. I 2023.11.29 18:16:41 - Checking authorization ... . 2023.11.29 18:16:42 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:42 - Connecting to Sheliak (Netherlands, Alblasserdam) . 2023.11.29 18:16:42 - Routes, add 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:42 - Routes, add 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.37:443 . 2023.11.29 18:16:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:42 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:42 - OpenVPN > UDP link remote: [AF_INET]213.152.186.37:443 . 2023.11.29 18:16:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.37:443, sid=ebe99574 2a8fbfde . 2023.11.29 18:16:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:43 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:43 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:43 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheliak, emailAddress=info@airvpn.org . 2023.11.29 18:16:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:43 - OpenVPN > [Sheliak] Peer Connection Initiated with [AF_INET]213.152.186.37:443 . 2023.11.29 18:16:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.62.1,dhcp-option DNS6 fde6:7a:7d20:1a3e::1,tun-ipv6,route-gateway 10.30.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a3e::10cb/64 fde6:7a:7d20:1a3e::1,ifconfig 10.30.62.205 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.11.29 18:16:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.62.1' . 2023.11.29 18:16:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a3e::1' . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:43 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:43 - OpenVPN > open_tun . 2023.11.29 18:16:43 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:43 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:43 - Disconnecting . 2023.11.29 18:16:43 - Routes, delete 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:43 - Routes, delete 213.152.186.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:43 - Connection terminated. I 2023.11.29 18:16:46 - Checking authorization ... . 2023.11.29 18:16:47 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:47 - Connecting to Merga (Netherlands, Alblasserdam) . 2023.11.29 18:16:47 - Routes, add 213.152.161.32/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:47 - Routes, add 213.152.161.32/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.32:443 . 2023.11.29 18:16:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:47 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:47 - OpenVPN > UDP link remote: [AF_INET]213.152.161.32:443 . 2023.11.29 18:16:47 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.32:443, sid=716fe815 ace9c93e . 2023.11.29 18:16:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:47 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:47 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:47 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Merga, emailAddress=info@airvpn.org . 2023.11.29 18:16:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:47 - OpenVPN > [Merga] Peer Connection Initiated with [AF_INET]213.152.161.32:443 . 2023.11.29 18:16:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.62.1,dhcp-option DNS6 fde6:7a:7d20:123e::1,tun-ipv6,route-gateway 10.22.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:123e::106d/64 fde6:7a:7d20:123e::1,ifconfig 10.22.62.111 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.11.29 18:16:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.62.1' . 2023.11.29 18:16:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:123e::1' . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:47 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:47 - OpenVPN > open_tun . 2023.11.29 18:16:47 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:47 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:47 - Disconnecting . 2023.11.29 18:16:48 - Routes, delete 213.152.161.32/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:48 - Routes, delete 213.152.161.32/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:48 - Connection terminated. I 2023.11.29 18:16:51 - Checking authorization ... . 2023.11.29 18:16:51 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:51 - Connecting to Phaet (Netherlands, Alblasserdam) . 2023.11.29 18:16:52 - Routes, add 213.152.187.232/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:52 - Routes, add 213.152.187.232/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.232:443 . 2023.11.29 18:16:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:52 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:52 - OpenVPN > UDP link remote: [AF_INET]213.152.187.232:443 . 2023.11.29 18:16:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.232:443, sid=d16448f8 57598a57 . 2023.11.29 18:16:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:52 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:52 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:52 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Phaet, emailAddress=info@airvpn.org . 2023.11.29 18:16:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:52 - OpenVPN > [Phaet] Peer Connection Initiated with [AF_INET]213.152.187.232:443 . 2023.11.29 18:16:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.222.1,dhcp-option DNS6 fde6:7a:7d20:16de::1,tun-ipv6,route-gateway 10.26.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:16de::107d/64 fde6:7a:7d20:16de::1,ifconfig 10.26.222.127 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.29 18:16:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.222.1' . 2023.11.29 18:16:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:16de::1' . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:52 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:52 - OpenVPN > open_tun . 2023.11.29 18:16:52 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:52 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:52 - Disconnecting . 2023.11.29 18:16:53 - Routes, delete 213.152.187.232/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:53 - Routes, delete 213.152.187.232/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:53 - Connection terminated. I 2023.11.29 18:16:56 - Checking authorization ... . 2023.11.29 18:16:56 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.11.29 18:16:56 - Connecting to Alpheratz (Netherlands, Alblasserdam) . 2023.11.29 18:16:57 - Routes, add 134.19.179.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:57 - Routes, add 134.19.179.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.11.29 18:16:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.29 18:16:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.29 18:16:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.29 18:16:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.29 18:16:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.29 18:16:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443 . 2023.11.29 18:16:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.29 18:16:57 - OpenVPN > UDP link local: (not bound) . 2023.11.29 18:16:57 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443 . 2023.11.29 18:16:57 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid=b5e3694b 8418cc2b . 2023.11.29 18:16:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.29 18:16:57 - OpenVPN > VERIFY KU OK . 2023.11.29 18:16:57 - OpenVPN > Validating certificate extended key usage . 2023.11.29 18:16:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.29 18:16:57 - OpenVPN > VERIFY EKU OK . 2023.11.29 18:16:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org . 2023.11.29 18:16:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.29 18:16:57 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.245:443 . 2023.11.29 18:16:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.222.1,dhcp-option DNS6 fde6:7a:7d20:1cde::1,tun-ipv6,route-gateway 10.32.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1cde::102f/64 fde6:7a:7d20:1cde::1,ifconfig 10.32.222.49 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2023.11.29 18:16:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.29 18:16:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.222.1' . 2023.11.29 18:16:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1cde::1' . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.29 18:16:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.29 18:16:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.29 18:16:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.29 18:16:57 - OpenVPN > interactive service msg_channel=0 . 2023.11.29 18:16:57 - OpenVPN > open_tun . 2023.11.29 18:16:57 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.11.29 18:16:57 - OpenVPN > Exiting due to fatal error ! 2023.11.29 18:16:57 - Disconnecting . 2023.11.29 18:16:57 - Routes, delete 134.19.179.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.11.29 18:16:57 - Routes, delete 134.19.179.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.11.29 18:16:57 - Connection terminated. I 2023.11.29 18:17:01 - Checking authorization ...