I 2024.04.08 06:31:35 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 7 Ultimate, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net Framework: v2.0.50727 . 2024.04.08 06:31:35 - Reading options from C:\Users\user1\AppData\Local\AirVPN\AirVPN.xml . 2024.04.08 06:31:35 - Command line arguments (1): path="home" I 2024.04.08 06:31:37 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2024.04.08 06:31:37 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) I 2024.04.08 06:31:37 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2024.04.08 06:31:37 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2024.04.08 06:31:37 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe) I 2024.04.08 06:31:37 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem ! 2024.04.08 06:31:37 - Activation of Network Lock - Windows Filtering Platform . 2024.04.08 06:31:37 - Updating systems & servers data ... ! 2024.04.08 06:31:37 - Ready . 2024.04.08 06:31:40 - Systems & servers data update completed I 2024.04.08 06:31:52 - Session starting. . 2024.04.08 06:31:52 - IPv6 disabled with packet filtering. I 2024.04.08 06:31:52 - Checking authorization ... ! 2024.04.08 06:31:53 - Connecting to Taurus (Spain, Madrid) . 2024.04.08 06:31:53 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2024.04.08 06:31:53 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2024.04.08 06:31:53 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2024.04.08 06:31:53 - Connection to OpenVPN Management Interface . 2024.04.08 06:31:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 W 2024.04.08 06:31:53 - OpenVPN > WARNING: Your certificate has expired! . 2024.04.08 06:31:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2024.04.08 06:31:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2024.04.08 06:31:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.99.104.34:443 . 2024.04.08 06:31:53 - OpenVPN > Socket Buffers: R=[8192->262144] S=[64512->262144] . 2024.04.08 06:31:53 - OpenVPN > UDP link local: (not bound) . 2024.04.08 06:31:53 - OpenVPN > UDP link remote: [AF_INET]194.99.104.34:443 . 2024.04.08 06:31:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2024.04.08 06:31:53 - OpenVPN > TLS: Initial packet from [AF_INET]194.99.104.34:443, sid=cd036fce 126c3e28 . 2024.04.08 06:31:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.08 06:31:53 - OpenVPN > VERIFY KU OK . 2024.04.08 06:31:53 - OpenVPN > Validating certificate extended key usage . 2024.04.08 06:31:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.08 06:31:53 - OpenVPN > VERIFY EKU OK . 2024.04.08 06:31:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Taurus, emailAddress=info@airvpn.org . 2024.04.08 06:32:25 - OpenVPN > [Taurus] Inactivity timeout (--ping-exit), exiting . 2024.04.08 06:32:25 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.04.08 06:32:30 - Disconnecting . 2024.04.08 06:32:30 - Connection terminated. I 2024.04.08 06:32:33 - Checking authorization ... ! 2024.04.08 06:32:33 - Connecting to Piautos (Netherlands, Alblasserdam) . 2024.04.08 06:32:33 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2024.04.08 06:32:33 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2024.04.08 06:32:33 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2024.04.08 06:32:33 - Connection to OpenVPN Management Interface . 2024.04.08 06:32:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 W 2024.04.08 06:32:33 - OpenVPN > WARNING: Your certificate has expired! . 2024.04.08 06:32:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2024.04.08 06:32:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2024.04.08 06:32:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.178.166:443 . 2024.04.08 06:32:33 - OpenVPN > Socket Buffers: R=[8192->262144] S=[64512->262144] . 2024.04.08 06:32:33 - OpenVPN > UDP link local: (not bound) . 2024.04.08 06:32:33 - OpenVPN > UDP link remote: [AF_INET]134.19.178.166:443 . 2024.04.08 06:32:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2024.04.08 06:32:34 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.178.166:443, sid=3d697e63 67a2a2ed . 2024.04.08 06:32:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.08 06:32:34 - OpenVPN > VERIFY KU OK . 2024.04.08 06:32:34 - OpenVPN > Validating certificate extended key usage . 2024.04.08 06:32:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.08 06:32:34 - OpenVPN > VERIFY EKU OK . 2024.04.08 06:32:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Piautos, emailAddress=info@airvpn.org