Eddie System/Environment Report - 1/9/2024 - 10:44 PM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\sabal\AppData\Local\Eddie\default.profile Data path: C:\Users\sabal\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 2600:1702:521b:99c0::1, 192.168.1.254 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 122 ms Test Ping IPv6: 130 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.allowlist: f0b8dc1c7b64d9497040bb4fc04a45cf1910006449e065c9b0293e4229c9c42f areas.allowlist: ca,br mode.type: openvpn mode.protocol: UDP mode.alt: 3 proxy.mode: none ---------------------------- Logs: . 2024.01.09 16:39:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:39:01 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:39:01 - OpenVPN > UDP link remote: [AF_INET]184.75.221.173:443 . 2024.01.09 16:39:01 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=fb2b6c16 77a97a72 . 2024.01.09 16:39:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:39:01 - OpenVPN > VERIFY KU OK . 2024.01.09 16:39:01 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:39:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:39:01 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:39:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org . 2024.01.09 16:39:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:39:01 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443 . 2024.01.09 16:39:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.190.1,dhcp-option DNS6 fde6:7a:7d20:4be::1,tun-ipv6,route-gateway 10.8.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4be::108b/64 fde6:7a:7d20:4be::1,ifconfig 10.8.190.141 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.01.09 16:39:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:39:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.190.1' . 2024.01.09 16:39:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4be::1' . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:39:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:39:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:39:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:39:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:39:01 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:39:01 - OpenVPN > open_tun . 2024.01.09 16:39:01 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:39:01 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:39:01 - Disconnecting . 2024.01.09 16:39:02 - Routes, delete 184.75.221.173/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:39:02 - Routes, delete 184.75.221.173/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:39:02 - Connection terminated. I 2024.01.09 16:39:04 - Cancel requested. ! 2024.01.09 16:39:04 - Session terminated. I 2024.01.09 16:40:15 - Session starting. I 2024.01.09 16:40:16 - Checking authorization ... . 2024.01.09 16:40:17 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:17 - Connecting to Avior (Canada, Toronto, Ontario) . 2024.01.09 16:40:17 - Routes, add 184.75.223.237/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:17 - Routes, add 184.75.223.237/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:17 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:17 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:17 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2024.01.09 16:40:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:17 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:17 - OpenVPN > UDP link remote: [AF_INET]184.75.223.237:443 . 2024.01.09 16:40:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=29f4abdd 05d5463f . 2024.01.09 16:40:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:17 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:17 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:17 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org . 2024.01.09 16:40:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:17 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 . 2024.01.09 16:40:18 - OpenVPN > SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.254.1,dhcp-option DNS6 fde6:7a:7d20:6fe::1,tun-ipv6,route-gateway 10.10.254.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6fe::1006/64 fde6:7a:7d20:6fe::1,ifconfig 10.10.254.8 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.01.09 16:40:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.254.1' . 2024.01.09 16:40:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6fe::1' . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:18 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:18 - OpenVPN > open_tun . 2024.01.09 16:40:18 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:18 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:18 - Disconnecting . 2024.01.09 16:40:18 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:18 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:18 - Connection terminated. I 2024.01.09 16:40:21 - Checking authorization ... . 2024.01.09 16:40:22 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:22 - Connecting to Sargas (Canada, Toronto, Ontario) . 2024.01.09 16:40:22 - Routes, add 184.75.223.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:22 - Routes, add 184.75.223.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2024.01.09 16:40:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:22 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:22 - OpenVPN > UDP link remote: [AF_INET]184.75.223.197:443 . 2024.01.09 16:40:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=2bfb82ca efd4db3c . 2024.01.09 16:40:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:22 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:22 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:22 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2024.01.09 16:40:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:22 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2024.01.09 16:40:23 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.62.1,dhcp-option DNS6 fde6:7a:7d20:193e::1,tun-ipv6,route-gateway 10.29.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:193e::10c1/64 fde6:7a:7d20:193e::1,ifconfig 10.29.62.195 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.01.09 16:40:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.62.1' . 2024.01.09 16:40:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:193e::1' . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:23 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:23 - OpenVPN > open_tun . 2024.01.09 16:40:23 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:23 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:23 - Disconnecting . 2024.01.09 16:40:23 - Sending soft termination signal . 2024.01.09 16:40:23 - Routes, delete 184.75.223.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:23 - Routes, delete 184.75.223.197/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:23 - Connection terminated. I 2024.01.09 16:40:26 - Checking authorization ... . 2024.01.09 16:40:27 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:27 - Connecting to Wurren (Canada, Toronto, Ontario) . 2024.01.09 16:40:27 - Routes, add 199.189.27.125/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:27 - Routes, add 199.189.27.125/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.189.27.125:443 . 2024.01.09 16:40:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:27 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:27 - OpenVPN > UDP link remote: [AF_INET]199.189.27.125:443 . 2024.01.09 16:40:27 - OpenVPN > TLS: Initial packet from [AF_INET]199.189.27.125:443, sid=553282f7 d95ce3f0 . 2024.01.09 16:40:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:27 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:27 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:27 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Wurren, emailAddress=info@airvpn.org . 2024.01.09 16:40:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:27 - OpenVPN > [Wurren] Peer Connection Initiated with [AF_INET]199.189.27.125:443 . 2024.01.09 16:40:28 - OpenVPN > SENT CONTROL [Wurren]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.222.1,dhcp-option DNS6 fde6:7a:7d20:5de::1,tun-ipv6,route-gateway 10.9.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5de::1037/64 fde6:7a:7d20:5de::1,ifconfig 10.9.222.57 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.01.09 16:40:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.222.1' . 2024.01.09 16:40:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5de::1' . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:28 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:28 - OpenVPN > open_tun . 2024.01.09 16:40:28 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:28 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:28 - Disconnecting . 2024.01.09 16:40:28 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:28 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:28 - Connection terminated. I 2024.01.09 16:40:31 - Checking authorization ... . 2024.01.09 16:40:32 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:32 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2024.01.09 16:40:32 - Routes, add 184.75.221.61/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:32 - Routes, add 184.75.221.61/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443 . 2024.01.09 16:40:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:32 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:32 - OpenVPN > UDP link remote: [AF_INET]184.75.221.61:443 . 2024.01.09 16:40:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=f5a5756b c7eb1d28 . 2024.01.09 16:40:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:32 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:32 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:32 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ukdah, emailAddress=info@airvpn.org . 2024.01.09 16:40:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:32 - OpenVPN > [Ukdah] Peer Connection Initiated with [AF_INET]184.75.221.61:443 . 2024.01.09 16:40:33 - OpenVPN > SENT CONTROL [Ukdah]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.254.1,dhcp-option DNS6 fde6:7a:7d20:1bfe::1,tun-ipv6,route-gateway 10.31.254.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bfe::1086/64 fde6:7a:7d20:1bfe::1,ifconfig 10.31.254.136 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.01.09 16:40:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.254.1' . 2024.01.09 16:40:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bfe::1' . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:33 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:33 - OpenVPN > open_tun . 2024.01.09 16:40:33 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:33 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:33 - Disconnecting . 2024.01.09 16:40:33 - Routes, delete 184.75.221.61/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:33 - Routes, delete 184.75.221.61/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:33 - Connection terminated. I 2024.01.09 16:40:36 - Checking authorization ... . 2024.01.09 16:40:37 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:37 - Connecting to Rotanev (Canada, Toronto, Ontario) . 2024.01.09 16:40:37 - Routes, add 104.254.90.190/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:37 - Routes, add 104.254.90.190/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.190:443 . 2024.01.09 16:40:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:37 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:37 - OpenVPN > UDP link remote: [AF_INET]104.254.90.190:443 . 2024.01.09 16:40:37 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.190:443, sid=63864f9a 8abac0f1 . 2024.01.09 16:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:37 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:37 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:37 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org . 2024.01.09 16:40:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:37 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.190:443 . 2024.01.09 16:40:38 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.94.1,dhcp-option DNS6 fde6:7a:7d20:185e::1,tun-ipv6,route-gateway 10.28.94.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:185e::1022/64 fde6:7a:7d20:185e::1,ifconfig 10.28.94.36 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.01.09 16:40:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.94.1' . 2024.01.09 16:40:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:185e::1' . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:38 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:38 - OpenVPN > open_tun . 2024.01.09 16:40:38 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:38 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:38 - Disconnecting . 2024.01.09 16:40:38 - Routes, delete 104.254.90.190/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:38 - Routes, delete 104.254.90.190/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:38 - Connection terminated. I 2024.01.09 16:40:41 - Checking authorization ... . 2024.01.09 16:40:42 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:42 - Connecting to Arkab (Canada, Toronto, Ontario) . 2024.01.09 16:40:42 - Routes, add 184.75.221.214/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:42 - Routes, add 184.75.221.214/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.214:443 . 2024.01.09 16:40:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:42 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:42 - OpenVPN > UDP link remote: [AF_INET]184.75.221.214:443 . 2024.01.09 16:40:42 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.214:443, sid=c8041bb3 6d5c91a2 . 2024.01.09 16:40:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:42 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:42 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:42 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org . 2024.01.09 16:40:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:43 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.214:443 . 2024.01.09 16:40:43 - OpenVPN > SENT CONTROL [Arkab]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.254.1,dhcp-option DNS6 fde6:7a:7d20:5fe::1,tun-ipv6,route-gateway 10.9.254.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5fe::10dc/64 fde6:7a:7d20:5fe::1,ifconfig 10.9.254.222 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.01.09 16:40:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.254.1' . 2024.01.09 16:40:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5fe::1' . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:43 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:43 - OpenVPN > open_tun . 2024.01.09 16:40:43 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:43 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:43 - Disconnecting . 2024.01.09 16:40:43 - Routes, delete 184.75.221.214/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:43 - Routes, delete 184.75.221.214/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:43 - Connection terminated. I 2024.01.09 16:40:46 - Checking authorization ... . 2024.01.09 16:40:47 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:47 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2024.01.09 16:40:47 - Routes, add 184.75.223.222/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:47 - Routes, add 184.75.223.222/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.222:443 . 2024.01.09 16:40:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:47 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:47 - OpenVPN > UDP link remote: [AF_INET]184.75.223.222:443 . 2024.01.09 16:40:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.222:443, sid=227720ac 75d392ad . 2024.01.09 16:40:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:47 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:47 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:47 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2024.01.09 16:40:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:47 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.222:443 . 2024.01.09 16:40:48 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.30.1,dhcp-option DNS6 fde6:7a:7d20:141e::1,tun-ipv6,route-gateway 10.24.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141e::10cd/64 fde6:7a:7d20:141e::1,ifconfig 10.24.30.207 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.01.09 16:40:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.30.1' . 2024.01.09 16:40:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:141e::1' . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:48 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:48 - OpenVPN > open_tun . 2024.01.09 16:40:48 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:48 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:48 - Disconnecting . 2024.01.09 16:40:48 - Routes, delete 184.75.223.222/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:48 - Routes, delete 184.75.223.222/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:48 - Connection terminated. I 2024.01.09 16:40:51 - Checking authorization ... . 2024.01.09 16:40:52 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:52 - Connecting to Chort (Canada, Toronto, Ontario) . 2024.01.09 16:40:52 - Routes, add 104.254.90.238/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:52 - Routes, add 104.254.90.238/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.238:443 . 2024.01.09 16:40:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:52 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:52 - OpenVPN > UDP link remote: [AF_INET]104.254.90.238:443 . 2024.01.09 16:40:52 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.238:443, sid=0217872c 446c6c4f . 2024.01.09 16:40:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:52 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:52 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:52 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2024.01.09 16:40:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:52 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.238:443 . 2024.01.09 16:40:53 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.62.1,dhcp-option DNS6 fde6:7a:7d20:a3e::1,tun-ipv6,route-gateway 10.14.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a3e::104b/64 fde6:7a:7d20:a3e::1,ifconfig 10.14.62.77 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.01.09 16:40:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.62.1' . 2024.01.09 16:40:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a3e::1' . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:53 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:53 - OpenVPN > open_tun . 2024.01.09 16:40:53 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:53 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:53 - Disconnecting . 2024.01.09 16:40:53 - Routes, delete 104.254.90.238/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:53 - Routes, delete 104.254.90.238/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:53 - Connection terminated. I 2024.01.09 16:40:56 - Checking authorization ... . 2024.01.09 16:40:57 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:40:57 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2024.01.09 16:40:57 - Routes, add 184.75.221.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:57 - Routes, add 184.75.221.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:40:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:40:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:40:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:40:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:40:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:40:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.206:443 . 2024.01.09 16:40:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:40:57 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:40:57 - OpenVPN > UDP link remote: [AF_INET]184.75.221.206:443 . 2024.01.09 16:40:57 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.206:443, sid=b186db6f 1200fa88 . 2024.01.09 16:40:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:40:57 - OpenVPN > VERIFY KU OK . 2024.01.09 16:40:57 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:40:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:40:57 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:40:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2024.01.09 16:40:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:40:57 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.206:443 . 2024.01.09 16:40:58 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:40:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.222.1,dhcp-option DNS6 fde6:7a:7d20:2de::1,tun-ipv6,route-gateway 10.6.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2de::10c2/64 fde6:7a:7d20:2de::1,ifconfig 10.6.222.196 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.01.09 16:40:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:40:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.222.1' . 2024.01.09 16:40:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2de::1' . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:40:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:40:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:40:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:40:58 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:40:58 - OpenVPN > open_tun . 2024.01.09 16:40:58 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:40:58 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:40:58 - Disconnecting . 2024.01.09 16:40:58 - Routes, delete 184.75.221.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:40:58 - Routes, delete 184.75.221.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:40:58 - Connection terminated. I 2024.01.09 16:41:01 - Checking authorization ... . 2024.01.09 16:41:02 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:02 - Connecting to Fulu (Brazil, Sao Paulo) . 2024.01.09 16:41:02 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:02 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:02 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:02 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:02 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:02 - OpenVPN > UDP link remote: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:03 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.163.94:443, sid=5efeb042 3f5a9ace . 2024.01.09 16:41:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:03 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:03 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:03 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fulu, emailAddress=info@airvpn.org . 2024.01.09 16:41:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:03 - OpenVPN > [Fulu] Peer Connection Initiated with [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:04 - OpenVPN > SENT CONTROL [Fulu]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.62.1,dhcp-option DNS6 fde6:7a:7d20:1c3e::1,tun-ipv6,route-gateway 10.32.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c3e::1062/64 fde6:7a:7d20:1c3e::1,ifconfig 10.32.62.100 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.01.09 16:41:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.62.1' . 2024.01.09 16:41:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c3e::1' . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:04 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:04 - OpenVPN > open_tun . 2024.01.09 16:41:04 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:04 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:04 - Disconnecting . 2024.01.09 16:41:04 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:04 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:04 - Connection terminated. I 2024.01.09 16:41:07 - Checking authorization ... . 2024.01.09 16:41:08 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:08 - Connecting to Fulu (Brazil, Sao Paulo) . 2024.01.09 16:41:08 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:08 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:08 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:08 - OpenVPN > UDP link remote: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:08 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.163.94:443, sid=8fe72c0d e357b150 . 2024.01.09 16:41:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:08 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:08 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:08 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fulu, emailAddress=info@airvpn.org . 2024.01.09 16:41:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:09 - OpenVPN > [Fulu] Peer Connection Initiated with [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:10 - OpenVPN > SENT CONTROL [Fulu]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.62.1,dhcp-option DNS6 fde6:7a:7d20:1c3e::1,tun-ipv6,route-gateway 10.32.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c3e::1062/64 fde6:7a:7d20:1c3e::1,ifconfig 10.32.62.100 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.01.09 16:41:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.62.1' . 2024.01.09 16:41:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c3e::1' . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:10 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:10 - OpenVPN > open_tun . 2024.01.09 16:41:10 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:10 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:10 - Disconnecting . 2024.01.09 16:41:10 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:10 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:10 - Connection terminated. I 2024.01.09 16:41:13 - Checking authorization ... . 2024.01.09 16:41:14 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:14 - Connecting to Fulu (Brazil, Sao Paulo) . 2024.01.09 16:41:14 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:14 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:14 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:14 - OpenVPN > UDP link remote: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.163.94:443, sid=7924d511 96215def . 2024.01.09 16:41:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:15 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:15 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:15 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fulu, emailAddress=info@airvpn.org . 2024.01.09 16:41:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:15 - OpenVPN > [Fulu] Peer Connection Initiated with [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:16 - OpenVPN > SENT CONTROL [Fulu]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.62.1,dhcp-option DNS6 fde6:7a:7d20:1c3e::1,tun-ipv6,route-gateway 10.32.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c3e::1062/64 fde6:7a:7d20:1c3e::1,ifconfig 10.32.62.100 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.01.09 16:41:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.62.1' . 2024.01.09 16:41:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c3e::1' . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:16 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:16 - OpenVPN > open_tun . 2024.01.09 16:41:16 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:16 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:16 - Disconnecting . 2024.01.09 16:41:16 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:16 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:16 - Connection terminated. I 2024.01.09 16:41:19 - Checking authorization ... . 2024.01.09 16:41:20 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:20 - Connecting to Fulu (Brazil, Sao Paulo) . 2024.01.09 16:41:20 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:20 - Routes, add 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:21 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:21 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:21 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:21 - OpenVPN > UDP link remote: [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:21 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.163.94:443, sid=df8d218f e12dca0a . 2024.01.09 16:41:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:21 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:21 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:21 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fulu, emailAddress=info@airvpn.org . 2024.01.09 16:41:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:21 - OpenVPN > [Fulu] Peer Connection Initiated with [AF_INET]146.70.163.94:443 . 2024.01.09 16:41:22 - OpenVPN > SENT CONTROL [Fulu]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.62.1,dhcp-option DNS6 fde6:7a:7d20:1c3e::1,tun-ipv6,route-gateway 10.32.62.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c3e::1062/64 fde6:7a:7d20:1c3e::1,ifconfig 10.32.62.100 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.01.09 16:41:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.62.1' . 2024.01.09 16:41:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c3e::1' . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:22 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:22 - OpenVPN > open_tun . 2024.01.09 16:41:22 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:22 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:22 - Disconnecting . 2024.01.09 16:41:23 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:23 - Routes, delete 146.70.163.94/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:23 - Connection terminated. I 2024.01.09 16:41:26 - Checking authorization ... . 2024.01.09 16:41:26 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:26 - Connecting to Tyl (Canada, Toronto, Ontario) . 2024.01.09 16:41:26 - Routes, add 184.75.223.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:27 - Routes, add 184.75.223.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.206:443 . 2024.01.09 16:41:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:27 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:27 - OpenVPN > UDP link remote: [AF_INET]184.75.223.206:443 . 2024.01.09 16:41:27 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.206:443, sid=97ac670b b13defb9 . 2024.01.09 16:41:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:27 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:27 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:27 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org . 2024.01.09 16:41:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:27 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.206:443 . 2024.01.09 16:41:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.222.1,dhcp-option DNS6 fde6:7a:7d20:1bde::1,tun-ipv6,route-gateway 10.31.222.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bde::1075/64 fde6:7a:7d20:1bde::1,ifconfig 10.31.222.119 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.01.09 16:41:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.222.1' . 2024.01.09 16:41:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bde::1' . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:27 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:27 - OpenVPN > open_tun . 2024.01.09 16:41:27 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:27 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:27 - Disconnecting . 2024.01.09 16:41:27 - Routes, delete 184.75.223.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:28 - Routes, delete 184.75.223.206/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:28 - Connection terminated. I 2024.01.09 16:41:31 - Checking authorization ... . 2024.01.09 16:41:31 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:31 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:31 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:31 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:32 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:32 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=b5d7af09 fe6a4dce . 2024.01.09 16:41:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:32 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:32 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:32 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:32 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 14,cipher AES-256-GCM' . 2024.01.09 16:41:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:32 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:32 - OpenVPN > open_tun . 2024.01.09 16:41:32 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:32 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:32 - Disconnecting . 2024.01.09 16:41:32 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:32 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:32 - Connection terminated. I 2024.01.09 16:41:35 - Checking authorization ... . 2024.01.09 16:41:36 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:36 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:36 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:37 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:37 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:37 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=8e029af7 dacfc88a . 2024.01.09 16:41:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:37 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:37 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:37 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:37 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:38 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 15,cipher AES-256-GCM' . 2024.01.09 16:41:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:38 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:38 - OpenVPN > open_tun . 2024.01.09 16:41:38 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:38 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:38 - Disconnecting . 2024.01.09 16:41:38 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:38 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:38 - Connection terminated. I 2024.01.09 16:41:41 - Checking authorization ... . 2024.01.09 16:41:42 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:42 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:42 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:42 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:42 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:42 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:42 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=70c30d90 6a8d6050 . 2024.01.09 16:41:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:42 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:42 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:42 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:42 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:43 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 14,cipher AES-256-GCM' . 2024.01.09 16:41:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:43 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:43 - OpenVPN > open_tun . 2024.01.09 16:41:43 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:43 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:43 - Disconnecting . 2024.01.09 16:41:43 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:43 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:43 - Connection terminated. I 2024.01.09 16:41:46 - Checking authorization ... . 2024.01.09 16:41:47 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:47 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:47 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:47 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:47 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=bdc22637 0ba9c2c2 . 2024.01.09 16:41:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:47 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:47 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:47 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:47 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:48 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 15,cipher AES-256-GCM' . 2024.01.09 16:41:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:48 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:48 - OpenVPN > open_tun . 2024.01.09 16:41:48 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:48 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:48 - Disconnecting . 2024.01.09 16:41:48 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:48 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:48 - Connection terminated. I 2024.01.09 16:41:51 - Checking authorization ... . 2024.01.09 16:41:52 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:52 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:52 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:53 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:53 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:53 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:53 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=23652c3d 3b13056d . 2024.01.09 16:41:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:53 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:53 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:53 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:53 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:54 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 14,cipher AES-256-GCM' . 2024.01.09 16:41:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:54 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:54 - OpenVPN > open_tun . 2024.01.09 16:41:54 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:54 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:54 - Disconnecting . 2024.01.09 16:41:54 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:54 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:54 - Connection terminated. I 2024.01.09 16:41:57 - Checking authorization ... . 2024.01.09 16:41:58 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2024.01.09 16:41:58 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.01.09 16:41:58 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:58 - Routes, add 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.01.09 16:41:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.01.09 16:41:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.01.09 16:41:58 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.01.09 16:41:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.09 16:41:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.09 16:41:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.09 16:41:58 - OpenVPN > UDP link local: (not bound) . 2024.01.09 16:41:58 - OpenVPN > UDP link remote: [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.182:443, sid=34ea407e f21ef870 . 2024.01.09 16:41:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.09 16:41:58 - OpenVPN > VERIFY KU OK . 2024.01.09 16:41:58 - OpenVPN > Validating certificate extended key usage . 2024.01.09 16:41:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.09 16:41:58 - OpenVPN > VERIFY EKU OK . 2024.01.09 16:41:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2024.01.09 16:41:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.09 16:41:58 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.182:443 . 2024.01.09 16:41:59 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) . 2024.01.09 16:41:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.190.1,dhcp-option DNS6 fde6:7a:7d20:18be::1,tun-ipv6,route-gateway 10.28.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18be::1032/64 fde6:7a:7d20:18be::1,ifconfig 10.28.190.52 255.255.255.0,peer-id 15,cipher AES-256-GCM' . 2024.01.09 16:41:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.09 16:41:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.190.1' . 2024.01.09 16:41:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18be::1' . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.09 16:41:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.09 16:41:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.09 16:41:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.09 16:41:59 - OpenVPN > interactive service msg_channel=0 . 2024.01.09 16:41:59 - OpenVPN > open_tun . 2024.01.09 16:41:59 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.01.09 16:41:59 - OpenVPN > Exiting due to fatal error ! 2024.01.09 16:41:59 - Disconnecting . 2024.01.09 16:41:59 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.01.09 16:41:59 - Routes, delete 184.75.221.182/32 for interface "Wi-Fi 2 (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.01.09 16:41:59 - Connection terminated. I 2024.01.09 16:42:02 - Checking authorization ... I 2024.01.09 16:42:03 - Cancel requested. ! 2024.01.09 16:42:03 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.254", "interface_index": 5, "metric": 0, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "169.254.0.0\/16", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "169.254.232.74\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "169.254.255.255\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "192.168.1.147\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}" }, { "destination": "::\/0", "gateway": "fe80::eec3:2ff:fed4:1021", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "2600:1702:521b:99c0::\/60", "gateway": "fe80::eec3:2ff:fed4:1021", "interface_index": 5, "metric": 16, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "2600:1702:521b:99c0::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "2600:1702:521b:99c0:962:9edd:498:ae9\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "2600:1702:521b:99c0:7d3e:b0a6:3524:d8b4\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}" }, { "destination": "fe80::d38:c5fc:1b2b:4b15\/128", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}" }, { "destination": "fe80::458a:5fd7:74dd:3b3f\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}" }, { "destination": "fe80::4866:23b9:5044:2337\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "fe80::75d1:ec58:c35c:e92a\/128", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "fe80::8ceb:5a02:d2a5:d708\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}" }, { "destination": "fe80::9f3a:5597:cfc8:4b45\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}" }, { "destination": "fe80::ab30:242:ba90:d39d\/128", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{C0FE8916-19FE-4165-A795-1D04E9127D93}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 21, "metric": 256, "interface": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}" } ], "ipv4-default-gateway": "192.168.1.254", "ipv4-default-interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}", "ipv6-default-gateway": "fe80::eec3:2ff:fed4:1021", "ipv6-default-interface": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}", "interfaces": [ { "friendly": "Ethernet 3", "id": "{C0FE8916-19FE-4165-A795-1D04E9127D93}", "name": "Ethernet 3", "description": "Intel(R) Ethernet Connection (12) I219-V", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::75d1:ec58:c35c:e92a", "169.254.232.74" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection 2", "id": "{E5CFD75F-FAA5-475F-94D2-B1187FE14BCB}", "name": "Local Area Connection 2", "description": "Windscribe Windtun420", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ab30:242:ba90:d39d", "169.254.54.33" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection", "id": "{DCDC5480-B0F6-405C-AA8A-9AE5124CDF8A}", "name": "Local Area Connection", "description": "Windscribe VPN", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8ceb:5a02:d2a5:d708", "169.254.226.70" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 3", "id": "{9B1B4CBC-D807-4167-83A0-D98B4F2AF893}", "name": "Local Area Connection* 3", "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::458a:5fd7:74dd:3b3f", "169.254.139.6" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 4", "id": "{14F99E12-4B8B-4F94-81EC-F9BB039632A1}", "name": "Local Area Connection* 4", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9f3a:5597:cfc8:4b45", "169.254.220.133" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi 2", "id": "{2969EE2B-7941-4D54-A594-DC76AF11DE50}", "name": "Wi-Fi 2", "description": "Intel(R) Wi-Fi 6 AX200 160MHz", "type": "Wireless80211", "status": "Up", "bytes_received": "22706785078", "bytes_sent": "2071659966", "support_ipv4": true, "support_ipv6": true, "ips": [ "2600:1702:521b:99c0:7d3e:b0a6:3524:d8b4", "2600:1702:521b:99c0:962:9edd:498:ae9", "fe80::4866:23b9:5044:2337", "192.168.1.147" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{F9EECD1C-A931-4F46-A3B3-9FB2A36B41E6}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d38:c5fc:1b2b:4b15", "169.254.57.78" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{2E9F0C8A-00D9-11EB-A22D-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-L5ITP2K Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : attlocal.net Ethernet adapter Ethernet 3: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Ethernet Connection (12) I219-V Physical Address. . . . . . . . . : 1A-2B-3C-4F-05-06 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Windscribe Windtun420 Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Windscribe VPN Physical Address. . . . . . . . . : 00-FF-DC-DC-54-80 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 3: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 Physical Address. . . . . . . . . : A4-B1-C1-C5-98-20 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 4: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 Physical Address. . . . . . . . . : A6-B1-C1-C5-98-1F DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi 2: Connection-specific DNS Suffix . : attlocal.net Description . . . . . . . . . . . : Intel(R) Wi-Fi 6 AX200 160MHz Physical Address. . . . . . . . . : A4-B1-C1-C5-98-1F DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2600:1702:521b:99c0:7d3e:b0a6:3524:d8b4(Preferred) Temporary IPv6 Address. . . . . . : 2600:1702:521b:99c0:962:9edd:498:ae9(Preferred) Link-local IPv6 Address . . . . . : fe80::4866:23b9:5044:2337%5(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.147(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, January 7, 2024 1:19:01 PM Lease Expires . . . . . . . . . . : Wednesday, January 10, 2024 3:36:58 PM Default Gateway . . . . . . . . . : fe80::eec3:2ff:fed4:1021%5 192.168.1.254 DHCP Server . . . . . . . . . . . : 192.168.1.254 DHCPv6 IAID . . . . . . . . . . . : 195342785 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2D-05-55-16-1A-2B-3C-4F-05-06 DNS Servers . . . . . . . . . . . : 2600:1702:521b:99c0::1 192.168.1.254 NetBIOS over Tcpip. . . . . . . . : Enabled Connection-specific DNS Suffix Search List : attlocal.net Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : A4-B1-C1-C5-98-23 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes