Eddie System/Environment Report - 25/01/2024 - 10:32 UTC Eddie version: 2.23.2 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.22631.0 OS architecture: x64 Framework: v4.0.30319 OpenVPN: 2.6.6 - OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.10.1 SSH: OpenSSH_for_Windows_8.6p1, LibreSSL 3.4.3 (C:\Windows\System32\OpenSSH\\ssh.exe) SSL: 5.69 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\cambe\AppData\Local\Eddie\default.profile Data path: C:\Users\cambe\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: fde6:7a:7d20:4ca::1, 10.8.202.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 19 ms Test Ping IPv6: 20 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Error: Fetch url error:SSL peer certificate or SSH remote key was not OK ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True ---------------------------- Logs: . 2024.01.25 11:29:49 - Eddie version: 2.23.2 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22631.0, Framework: v4.0.30319 . 2024.01.25 11:29:49 - Command line arguments (1): path="home" . 2024.01.25 11:29:49 - Collect network information . 2024.01.25 11:29:50 - Profile options not found, using defaults. . 2024.01.25 11:29:50 - OpenVPN - Version: 2.6.6 - OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.01.25 11:29:50 - SSH - Version: OpenSSH_for_Windows_8.6p1, LibreSSL 3.4.3 (C:\Windows\System32\OpenSSH\\ssh.exe) . 2024.01.25 11:29:50 - SSL - Version: 5.69 (C:\Program Files\AirVPN\stunnel.exe) I 2024.01.25 11:29:50 - Ready . 2024.01.25 11:29:51 - Collect information about AirVPN completed I 2024.01.25 11:30:24 - Checking login ... ! 2024.01.25 11:30:25 - Logged in. ! 2024.01.25 11:30:27 - Activation of Network Lock - Windows Filtering Platform I 2024.01.25 11:30:53 - Session starting. I 2024.01.25 11:30:56 - Checking authorization ... . 2024.01.25 11:30:56 - Collect network information . 2024.01.25 11:30:57 - Added new network interface "Eddie", Wintun version 0.12 . 2024.01.25 11:30:57 - Collect network information . 2024.01.25 11:30:57 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2024.01.25 11:30:57 - Connecting to Suhail (Netherlands, Alblasserdam) . 2024.01.25 11:30:57 - Routes, add 134.19.179.189/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:30:57 - Routes, add 134.19.179.189/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.01.25 11:30:57 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2024.01.25 11:30:57 - OpenVPN > OpenVPN 2.6.6 [git:v2.6.6/c9540130121bfc21] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug 15 2023 . 2024.01.25 11:30:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2024.01.25 11:30:57 - OpenVPN > library versions: OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 . 2024.01.25 11:30:57 - OpenVPN > DCO version: v0 . 2024.01.25 11:30:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.189:443 . 2024.01.25 11:30:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.25 11:30:57 - OpenVPN > UDPv4 link local: (not bound) . 2024.01.25 11:30:57 - OpenVPN > UDPv4 link remote: [AF_INET]134.19.179.189:443 . 2024.01.25 11:30:57 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.189:443, sid=b0800b81 25779bcc . 2024.01.25 11:30:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.25 11:30:57 - OpenVPN > VERIFY KU OK . 2024.01.25 11:30:57 - OpenVPN > Validating certificate extended key usage . 2024.01.25 11:30:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.25 11:30:57 - OpenVPN > VERIFY EKU OK . 2024.01.25 11:30:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Suhail, emailAddress=info@airvpn.org . 2024.01.25 11:30:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.25 11:30:57 - OpenVPN > [Suhail] Peer Connection Initiated with [AF_INET]134.19.179.189:443 . 2024.01.25 11:30:57 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2024.01.25 11:30:57 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2024.01.25 11:30:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.138.1,dhcp-option DNS6 fde6:7a:7d20:1e8a::1,tun-ipv6,route-gateway 10.34.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e8a::10e6/64 fde6:7a:7d20:1e8a::1,ifconfig 10.34.138.232 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.01.25 11:30:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.25 11:30:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.138.1' . 2024.01.25 11:30:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1e8a::1' . 2024.01.25 11:30:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.25 11:30:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.25 11:30:57 - OpenVPN > interactive service msg_channel=0 . 2024.01.25 11:30:57 - OpenVPN > open_tun . 2024.01.25 11:30:57 - OpenVPN > wintun device [Eddie] opened . 2024.01.25 11:30:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 51 static 10.34.138.232 255.255.255.0 . 2024.01.25 11:30:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 51 all . 2024.01.25 11:30:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 51 all . 2024.01.25 11:30:57 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:30:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:1e8a::10e6/128 store=active . 2024.01.25 11:30:57 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1e8a::/64 -> fde6:7a:7d20:1e8a::10e6 metric 0) IF 51 . 2024.01.25 11:30:57 - OpenVPN > IPv6 route added using ipapi . 2024.01.25 11:30:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 51 all . 2024.01.25 11:30:57 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:30:57 - OpenVPN > Initialization Sequence Completed . 2024.01.25 11:30:57 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub' . 2024.01.25 11:30:57 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.01.25 11:30:57 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.01.25 11:30:57 - DNS leak protection with packet filtering enabled. . 2024.01.25 11:30:57 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.34.138.1) . 2024.01.25 11:30:58 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1e8a::1) . 2024.01.25 11:30:58 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.34.138.1) . 2024.01.25 11:30:58 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1e8a::1) . 2024.01.25 11:30:58 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Routes, add 134.19.179.187/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Routes, add 2a00:1678:2470:1001:63f4:41:52a6:8a00/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:30:58 - Flushing DNS I 2024.01.25 11:30:58 - Checking route IPv4 . 2024.01.25 11:31:05 - Checking route (4° try) . 2024.01.25 11:31:09 - Checking route (5° try) E 2024.01.25 11:31:09 - Checking route IPv4 failed, last reason: Fetch url error:SSL peer certificate or SSH remote key was not OK . 2024.01.25 11:31:09 - OpenVPN > Timers: ping 10, ping-restart 60 . 2024.01.25 11:31:09 - OpenVPN > Protocol options: explicit-exit-notify 5 ! 2024.01.25 11:31:09 - Disconnecting . 2024.01.25 11:31:09 - Sending soft termination signal . 2024.01.25 11:31:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.01.25 11:31:14 - OpenVPN > Closing TUN/TAP interface . 2024.01.25 11:31:14 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1e8a::/64) . 2024.01.25 11:31:14 - OpenVPN > IPv6 route deleted using ipapi . 2024.01.25 11:31:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:1e8a::10e6 store=active . 2024.01.25 11:31:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 51 10.34.138.232 store=active . 2024.01.25 11:31:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.01.25 11:31:14 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete 134.19.179.189/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:31:15 - Routes, delete 134.19.179.187/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete 2a00:1678:2470:1001:63f4:41:52a6:8a00/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:15 - Routes, delete 134.19.179.189/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.01.25 11:31:15 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:15 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:15 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:15 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:15 - DNS leak protection with packet filtering disabled. . 2024.01.25 11:31:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.01.25 11:31:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.01.25 11:31:15 - Connection terminated. I 2024.01.25 11:31:18 - Checking authorization ... . 2024.01.25 11:31:19 - Collect network information . 2024.01.25 11:31:19 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2024.01.25 11:31:19 - Connecting to Kajam (Netherlands, Alblasserdam) . 2024.01.25 11:31:19 - Routes, add 213.152.161.87/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:31:19 - Routes, add 213.152.161.87/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.01.25 11:31:19 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2024.01.25 11:31:19 - OpenVPN > OpenVPN 2.6.6 [git:v2.6.6/c9540130121bfc21] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug 15 2023 . 2024.01.25 11:31:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2024.01.25 11:31:19 - OpenVPN > library versions: OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 . 2024.01.25 11:31:19 - OpenVPN > DCO version: v0 . 2024.01.25 11:31:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2024.01.25 11:31:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.25 11:31:19 - OpenVPN > UDPv4 link local: (not bound) . 2024.01.25 11:31:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.87:443 . 2024.01.25 11:31:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=899aaed9 0f5650a0 . 2024.01.25 11:31:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.25 11:31:19 - OpenVPN > VERIFY KU OK . 2024.01.25 11:31:19 - OpenVPN > Validating certificate extended key usage . 2024.01.25 11:31:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.25 11:31:19 - OpenVPN > VERIFY EKU OK . 2024.01.25 11:31:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org . 2024.01.25 11:31:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.25 11:31:19 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443 . 2024.01.25 11:31:19 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2024.01.25 11:31:19 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2024.01.25 11:31:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.234.1,dhcp-option DNS6 fde6:7a:7d20:fea::1,tun-ipv6,route-gateway 10.19.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fea::1075/64 fde6:7a:7d20:fea::1,ifconfig 10.19.234.119 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.01.25 11:31:19 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.25 11:31:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.234.1' . 2024.01.25 11:31:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fea::1' . 2024.01.25 11:31:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.25 11:31:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.25 11:31:19 - OpenVPN > interactive service msg_channel=0 . 2024.01.25 11:31:19 - OpenVPN > open_tun . 2024.01.25 11:31:19 - OpenVPN > wintun device [Eddie] opened . 2024.01.25 11:31:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 51 static 10.19.234.119 255.255.255.0 . 2024.01.25 11:31:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 51 all . 2024.01.25 11:31:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 51 all . 2024.01.25 11:31:20 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:31:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:fea::1075/128 store=active . 2024.01.25 11:31:20 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fea::/64 -> fde6:7a:7d20:fea::1075 metric 0) IF 51 . 2024.01.25 11:31:20 - OpenVPN > IPv6 route added using ipapi . 2024.01.25 11:31:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 51 all . 2024.01.25 11:31:20 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:31:20 - OpenVPN > Initialization Sequence Completed . 2024.01.25 11:31:20 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 5, compression: 'stub' . 2024.01.25 11:31:20 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.01.25 11:31:20 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.01.25 11:31:20 - DNS leak protection with packet filtering enabled. . 2024.01.25 11:31:20 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.234.1) . 2024.01.25 11:31:20 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fea::1) . 2024.01.25 11:31:20 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.19.234.1) . 2024.01.25 11:31:20 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:fea::1) . 2024.01.25 11:31:20 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:20 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:20 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:20 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:21 - Routes, add 213.152.161.85/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:21 - Routes, add 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:21 - Flushing DNS I 2024.01.25 11:31:21 - Checking route IPv4 . 2024.01.25 11:31:27 - Checking route (4° try) . 2024.01.25 11:31:31 - Checking route (5° try) E 2024.01.25 11:31:31 - Checking route IPv4 failed, last reason: Fetch url error:SSL peer certificate or SSH remote key was not OK . 2024.01.25 11:31:31 - OpenVPN > Timers: ping 10, ping-restart 60 . 2024.01.25 11:31:31 - OpenVPN > Protocol options: explicit-exit-notify 5 ! 2024.01.25 11:31:31 - Disconnecting . 2024.01.25 11:31:31 - Sending soft termination signal . 2024.01.25 11:31:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.01.25 11:31:36 - OpenVPN > Closing TUN/TAP interface . 2024.01.25 11:31:36 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fea::/64) . 2024.01.25 11:31:36 - OpenVPN > IPv6 route deleted using ipapi . 2024.01.25 11:31:36 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:fea::1075 store=active . 2024.01.25 11:31:36 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 51 10.19.234.119 store=active . 2024.01.25 11:31:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.01.25 11:31:36 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:36 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:37 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:37 - Routes, delete 213.152.161.87/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:31:37 - Routes, delete 213.152.161.85/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:37 - Routes, delete 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:37 - Routes, delete 213.152.161.87/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.01.25 11:31:37 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:37 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:37 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:37 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:37 - DNS leak protection with packet filtering disabled. . 2024.01.25 11:31:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.01.25 11:31:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.01.25 11:31:37 - Connection terminated. I 2024.01.25 11:31:40 - Checking authorization ... . 2024.01.25 11:31:41 - Collect network information . 2024.01.25 11:31:41 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2024.01.25 11:31:41 - Connecting to Luhman (Netherlands, Alblasserdam) . 2024.01.25 11:31:41 - Routes, add 213.152.186.170/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:31:41 - Routes, add 213.152.186.170/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.01.25 11:31:41 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2024.01.25 11:31:41 - OpenVPN > OpenVPN 2.6.6 [git:v2.6.6/c9540130121bfc21] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug 15 2023 . 2024.01.25 11:31:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2024.01.25 11:31:41 - OpenVPN > library versions: OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 . 2024.01.25 11:31:41 - OpenVPN > DCO version: v0 . 2024.01.25 11:31:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.170:443 . 2024.01.25 11:31:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.25 11:31:41 - OpenVPN > UDPv4 link local: (not bound) . 2024.01.25 11:31:41 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.186.170:443 . 2024.01.25 11:31:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.170:443, sid=0caa93df 7a12baaf . 2024.01.25 11:31:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.25 11:31:41 - OpenVPN > VERIFY KU OK . 2024.01.25 11:31:41 - OpenVPN > Validating certificate extended key usage . 2024.01.25 11:31:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.25 11:31:41 - OpenVPN > VERIFY EKU OK . 2024.01.25 11:31:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2024.01.25 11:31:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.25 11:31:41 - OpenVPN > [Luhman] Peer Connection Initiated with [AF_INET]213.152.186.170:443 . 2024.01.25 11:31:41 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2024.01.25 11:31:41 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2024.01.25 11:31:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.202.1,dhcp-option DNS6 fde6:7a:7d20:1eca::1,tun-ipv6,route-gateway 10.34.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1eca::10f8/64 fde6:7a:7d20:1eca::1,ifconfig 10.34.202.250 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.01.25 11:31:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.25 11:31:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.202.1' . 2024.01.25 11:31:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1eca::1' . 2024.01.25 11:31:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.25 11:31:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.25 11:31:41 - OpenVPN > interactive service msg_channel=0 . 2024.01.25 11:31:41 - OpenVPN > open_tun . 2024.01.25 11:31:41 - OpenVPN > wintun device [Eddie] opened . 2024.01.25 11:31:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 51 static 10.34.202.250 255.255.255.0 . 2024.01.25 11:31:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 51 all . 2024.01.25 11:31:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 51 all . 2024.01.25 11:31:41 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:31:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:1eca::10f8/128 store=active . 2024.01.25 11:31:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1eca::/64 -> fde6:7a:7d20:1eca::10f8 metric 0) IF 51 . 2024.01.25 11:31:41 - OpenVPN > IPv6 route added using ipapi . 2024.01.25 11:31:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 51 all . 2024.01.25 11:31:41 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:31:41 - OpenVPN > Initialization Sequence Completed . 2024.01.25 11:31:41 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub' . 2024.01.25 11:31:41 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.01.25 11:31:41 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.01.25 11:31:41 - DNS leak protection with packet filtering enabled. . 2024.01.25 11:31:41 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.34.202.1) . 2024.01.25 11:31:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1eca::1) . 2024.01.25 11:31:42 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.34.202.1) . 2024.01.25 11:31:42 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1eca::1) . 2024.01.25 11:31:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Routes, add 213.152.186.168/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Routes, add 2a00:1678:1337:2429:4c19:55f8:dbef:d67e/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:42 - Flushing DNS I 2024.01.25 11:31:42 - Checking route IPv4 . 2024.01.25 11:31:49 - Checking route (4° try) . 2024.01.25 11:31:53 - Checking route (5° try) E 2024.01.25 11:31:53 - Checking route IPv4 failed, last reason: Fetch url error:SSL peer certificate or SSH remote key was not OK . 2024.01.25 11:31:53 - OpenVPN > Timers: ping 10, ping-restart 60 . 2024.01.25 11:31:53 - OpenVPN > Protocol options: explicit-exit-notify 5 ! 2024.01.25 11:31:53 - Disconnecting . 2024.01.25 11:31:53 - Sending soft termination signal . 2024.01.25 11:31:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.01.25 11:31:57 - OpenVPN > Closing TUN/TAP interface . 2024.01.25 11:31:57 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1eca::/64) . 2024.01.25 11:31:57 - OpenVPN > IPv6 route deleted using ipapi . 2024.01.25 11:31:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:1eca::10f8 store=active . 2024.01.25 11:31:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 51 10.34.202.250 store=active . 2024.01.25 11:31:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.01.25 11:31:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:57 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:58 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:58 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:58 - Routes, delete 213.152.186.170/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:31:58 - Routes, delete 213.152.186.168/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:58 - Routes, delete 2a00:1678:1337:2429:4c19:55f8:dbef:d67e/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:31:58 - Routes, delete 213.152.186.170/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.01.25 11:31:58 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:58 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.01.25 11:31:58 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:58 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.01.25 11:31:58 - DNS leak protection with packet filtering disabled. . 2024.01.25 11:31:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.01.25 11:31:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.01.25 11:31:58 - Connection terminated. I 2024.01.25 11:32:01 - Checking authorization ... . 2024.01.25 11:32:02 - Collect network information . 2024.01.25 11:32:02 - Using wintun network interface "Eddie (Eddie Tunnel)" ! 2024.01.25 11:32:02 - Connecting to Alzirr (Netherlands, Alblasserdam) . 2024.01.25 11:32:02 - Routes, add 213.152.187.207/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.01.25 11:32:02 - Routes, add 213.152.187.207/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.01.25 11:32:02 - OpenVPN > Note: '--allow-compression' is not set to 'no', disabling data channel offload. . 2024.01.25 11:32:02 - OpenVPN > OpenVPN 2.6.6 [git:v2.6.6/c9540130121bfc21] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug 15 2023 . 2024.01.25 11:32:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater), amd64 executable . 2024.01.25 11:32:02 - OpenVPN > library versions: OpenSSL 3.1.2 1 Aug 2023, LZO 2.10 . 2024.01.25 11:32:02 - OpenVPN > DCO version: v0 . 2024.01.25 11:32:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.207:443 . 2024.01.25 11:32:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.01.25 11:32:02 - OpenVPN > UDPv4 link local: (not bound) . 2024.01.25 11:32:02 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.187.207:443 . 2024.01.25 11:32:02 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.207:443, sid=f4dc4c53 3222797b . 2024.01.25 11:32:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.25 11:32:02 - OpenVPN > VERIFY KU OK . 2024.01.25 11:32:02 - OpenVPN > Validating certificate extended key usage . 2024.01.25 11:32:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.25 11:32:02 - OpenVPN > VERIFY EKU OK . 2024.01.25 11:32:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alzirr, emailAddress=info@airvpn.org . 2024.01.25 11:32:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.25 11:32:02 - OpenVPN > [Alzirr] Peer Connection Initiated with [AF_INET]213.152.187.207:443 . 2024.01.25 11:32:02 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2024.01.25 11:32:02 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2024.01.25 11:32:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.202.1,dhcp-option DNS6 fde6:7a:7d20:4ca::1,tun-ipv6,route-gateway 10.8.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4ca::10a8/64 fde6:7a:7d20:4ca::1,ifconfig 10.8.202.170 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.01.25 11:32:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.25 11:32:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.202.1' . 2024.01.25 11:32:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4ca::1' . 2024.01.25 11:32:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.25 11:32:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.25 11:32:03 - OpenVPN > interactive service msg_channel=0 . 2024.01.25 11:32:03 - OpenVPN > open_tun . 2024.01.25 11:32:03 - OpenVPN > wintun device [Eddie] opened . 2024.01.25 11:32:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 51 static 10.8.202.170 255.255.255.0 . 2024.01.25 11:32:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 51 all . 2024.01.25 11:32:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 51 all . 2024.01.25 11:32:03 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:32:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:4ca::10a8/128 store=active . 2024.01.25 11:32:03 - OpenVPN > add_route_ipv6(fde6:7a:7d20:4ca::/64 -> fde6:7a:7d20:4ca::10a8 metric 0) IF 51 . 2024.01.25 11:32:03 - OpenVPN > IPv6 route added using ipapi . 2024.01.25 11:32:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 51 all . 2024.01.25 11:32:03 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2024.01.25 11:32:03 - OpenVPN > Initialization Sequence Completed . 2024.01.25 11:32:03 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 7, compression: 'stub' . 2024.01.25 11:32:03 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.01.25 11:32:03 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.01.25 11:32:03 - DNS leak protection with packet filtering enabled. . 2024.01.25 11:32:03 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.202.1) . 2024.01.25 11:32:03 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:4ca::1) . 2024.01.25 11:32:03 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.8.202.1) . 2024.01.25 11:32:03 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:4ca::1) . 2024.01.25 11:32:03 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:03 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:03 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:04 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:04 - Routes, add 213.152.187.205/32 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:04 - Routes, add 2a00:1678:1337:7a20:5bfe:98a:a67c:3dd3/128 for interface "Eddie (Eddie Tunnel)". . 2024.01.25 11:32:04 - Flushing DNS I 2024.01.25 11:32:04 - Checking route IPv4 ---------------------------- Network Info: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface_index": 12, "metric": 0, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "0.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "10.8.202.0\/24", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "10.8.202.170\/32", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "10.8.202.255\/32", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "128.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "192.168.1.244\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "213.152.187.205\/32", "gateway": "0.0.0.0", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "213.152.187.207\/32", "gateway": "192.168.1.1", "interface_index": 12, "metric": 0, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{D00F4346-6696-4911-81BE-42AED3F83FEB}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{D00F4346-6696-4911-81BE-42AED3F83FEB}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "::\/1", "gateway": "::", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "2a00:1678:1337:7a20:5bfe:98a:a67c:3dd3\/128", "gateway": "::", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "8000::\/1", "gateway": "::", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "fde6:7a:7d20:4ca::\/64", "gateway": "fe80::8", "interface_index": 51, "metric": 0, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "fde6:7a:7d20:4ca::10a8\/128", "gateway": "::", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{D00F4346-6696-4911-81BE-42AED3F83FEB}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "fe80::8204:a6de:6d58:5add\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}" }, { "destination": "fe80::9ba6:af2:9f57:8ad5\/128", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "fe80::9d13:3976:527e:3c19\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}" }, { "destination": "fe80::b0bf:2f82:5c22:e654\/128", "gateway": "::", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" }, { "destination": "fe80::d52e:91b4:32cf:b459\/128", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}" }, { "destination": "fe80::e49f:a56a:3ef9:e23\/128", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{D00F4346-6696-4911-81BE-42AED3F83FEB}" }, { "destination": "fe80::e807:651e:e4dc:35b5\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{D00F4346-6696-4911-81BE-42AED3F83FEB}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 51, "metric": 256, "interface": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}", "interfaces": [ { "friendly": "Eddie", "id": "{CF1E4104-E5EE-4F62-807F-1CA4452E22A5}", "name": "Eddie", "description": "Eddie Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "260448", "bytes_sent": "249516", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:4ca::10a8", "fe80::b0bf:2f82:5c22:e654", "10.8.202.170" ], "bind": true, "dns4": "10.8.202.1", "dns6": "fde6:7a:7d20:4ca::1", "device_id": "wintun" }, { "friendly": "LAN-verbinding", "id": "{D00F4346-6696-4911-81BE-42AED3F83FEB}", "name": "LAN-verbinding", "description": "Kaspersky VPN", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::e49f:a56a:3ef9:e23", "169.254.26.189" ], "bind": true, "dns4": "", "dns6": "", "device_id": "root\\kltun" }, { "friendly": "Ethernet", "id": "{7D96D4BA-AD41-4038-AB6F-CA2AD2F09E9B}", "name": "Ethernet", "description": "Realtek Gaming 2.5GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "41441707", "bytes_sent": "3028449", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9ba6:af2:9f57:8ad5", "192.168.1.244" ], "bind": true, "dns4": "10.8.202.1", "dns6": "fde6:7a:7d20:4ca::1", "device_id": "PCI\\VEN_10EC&DEV_8125&SUBSYS_E0001458&REV_05" }, { "friendly": "Wi-Fi", "id": "{712F6A8A-7DD4-4B58-90F7-726C709E869A}", "name": "Wi-Fi", "description": "Intel(R) Wi-Fi 6E AX211 160MHz", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d52e:91b4:32cf:b459", "169.254.197.31" ], "bind": true, "dns4": "", "dns6": "", "device_id": "PCI\\VEN_8086&DEV_7A70&SUBSYS_00948086" }, { "friendly": "LAN-verbinding* 1", "id": "{E006AAB4-D5C0-43F4-B61E-5906EE6EC810}", "name": "LAN-verbinding* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::e807:651e:e4dc:35b5", "169.254.106.126" ], "bind": true, "dns4": "", "dns6": "", "device_id": "{5d624f94-8850-40c3-a3fa-a4fd2080baf3}\\vwifimp_wfd" }, { "friendly": "LAN-verbinding* 2", "id": "{3773B4A9-A891-42EF-B0F0-C7E46F5A6569}", "name": "LAN-verbinding* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9d13:3976:527e:3c19", "169.254.127.14" ], "bind": true, "dns4": "", "dns6": "", "device_id": "{5d624f94-8850-40c3-a3fa-a4fd2080baf3}\\vwifimp_wfd" }, { "friendly": "Bluetooth-netwerkverbinding", "id": "{EFFCB3D9-DE3F-4F93-8E76-F20BECFD367F}", "name": "Bluetooth-netwerkverbinding", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8204:a6de:6d58:5add", "169.254.133.242" ], "bind": true, "dns4": "", "dns6": "", "device_id": "BTH\\MS_BTHPAN" }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{BC8EB5C8-9139-11EE-BF80-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ovpn-dco version: wintun version: Automatic tap-windows6 version: ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-Q9NNBAL Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter Eddie: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Eddie Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:4ca::10a8(Preferred) Link-local IPv6 Address . . . . . : fe80::b0bf:2f82:5c22:e654%51(Preferred) IPv4 Address. . . . . . . . . . . : 10.8.202.170(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : fde6:7a:7d20:4ca::1 10.8.202.1 NetBIOS over Tcpip. . . . . . . . : Enabled Unknown adapter LAN-verbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Kaspersky VPN Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek Gaming 2.5GbE Family Controller Physical Address. . . . . . . . . : 74-56-3C-74-34-04 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::9ba6:af2:9f57:8ad5%12(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.244(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : donderdag 25 januari 2024 11:18:30 Lease Expires . . . . . . . . . . : donderdag 25 januari 2024 13:18:29 Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 108287548 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2C-FD-24-38-74-56-3C-74-34-04 DNS Servers . . . . . . . . . . . : fde6:7a:7d20:4ca::1 10.8.202.1 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Wi-Fi: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Wi-Fi 6E AX211 160MHz Physical Address. . . . . . . . . : D4-D8-53-FA-2A-67 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : D4-D8-53-FA-2A-68 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : D6-D8-53-FA-2A-67 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Bluetooth-netwerkverbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : D4-D8-53-FA-2A-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes