Eddie System/Environment Report - 17-Apr-24 - 8:47 PM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\ag\AppData\Local\Eddie\default.profile Data path: C:\Users\ag\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 10.1.26.1, 8.8.8.8 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 143 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Timeout was reached Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.scoretype: Latency areas.allowlist: us mode.type: openvpn mode.protocol: TCP mode.alt: 2 proxy.mode: none ui.skip.promotional: True gui.notifications: False ---------------------------- Logs: . 2024.04.17 13:43:01 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2024.04.17 13:43:04 - Reading options from C:\Users\ag\AppData\Local\Eddie\default.profile . 2024.04.17 13:43:05 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.04.17 13:43:05 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.04.17 13:43:05 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2024.04.17 13:43:05 - Activation of Network Lock - Windows Filtering Platform I 2024.04.17 13:43:05 - Ready . 2024.04.17 13:43:07 - Collect information about AirVPN completed I 2024.04.17 13:43:07 - Session starting. . 2024.04.17 13:43:07 - Waiting for latency tests (29 to go) . 2024.04.17 13:43:08 - Collect information about AirVPN completed I 2024.04.17 13:43:09 - Checking authorization ... . 2024.04.17 13:43:10 - Added new network interface "Eddie", Wintun version 0.12 . 2024.04.17 13:43:10 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:10 - Connecting to Bunda (United States of America, San Jose, California) . 2024.04.17 13:43:10 - Routes, add 198.54.134.254/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:10 - Routes, add 198.54.134.254/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.134.254:443 . 2024.04.17 13:43:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]198.54.134.254:443 [nonblock] . 2024.04.17 13:43:11 - OpenVPN > TCP connection established with [AF_INET]198.54.134.254:443 . 2024.04.17 13:43:11 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]198.54.134.254:443 . 2024.04.17 13:43:11 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.134.254:443, sid=afcb8aa6 75f69138 . 2024.04.17 13:43:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:11 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:11 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:11 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Bunda, emailAddress=info@airvpn.org . 2024.04.17 13:43:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:11 - OpenVPN > [Bunda] Peer Connection Initiated with [AF_INET]198.54.134.254:443 . 2024.04.17 13:43:12 - OpenVPN > SENT CONTROL [Bunda]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:12 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:12 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:12 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:12 - Disconnecting . 2024.04.17 13:43:12 - Routes, delete 198.54.134.254/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:12 - Routes, delete 198.54.134.254/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:12 - Connection terminated. I 2024.04.17 13:43:15 - Checking authorization ... . 2024.04.17 13:43:16 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:16 - Connecting to Phoenix (United States of America, Phoenix, Arizona) . 2024.04.17 13:43:16 - Routes, add 193.37.254.37/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:16 - Routes, add 193.37.254.37/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:16 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:16 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:16 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.37:443 . 2024.04.17 13:43:16 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:16 - OpenVPN > Attempting to establish TCP connection with [AF_INET]193.37.254.37:443 [nonblock] . 2024.04.17 13:43:16 - OpenVPN > TCP connection established with [AF_INET]193.37.254.37:443 . 2024.04.17 13:43:16 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:16 - OpenVPN > TCP_CLIENT link remote: [AF_INET]193.37.254.37:443 . 2024.04.17 13:43:16 - OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.37:443, sid=cea2b366 5582aaa8 . 2024.04.17 13:43:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:17 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:17 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:17 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Phoenix, emailAddress=info@airvpn.org . 2024.04.17 13:43:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:17 - OpenVPN > [Phoenix] Peer Connection Initiated with [AF_INET]193.37.254.37:443 . 2024.04.17 13:43:18 - OpenVPN > SENT CONTROL [Phoenix]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:18 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:18 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:18 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:18 - Disconnecting . 2024.04.17 13:43:18 - Routes, delete 193.37.254.37/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:18 - Routes, delete 193.37.254.37/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:18 - Connection terminated. I 2024.04.17 13:43:21 - Checking authorization ... . 2024.04.17 13:43:22 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:22 - Connecting to Virgo (United States of America, Phoenix, Arizona) . 2024.04.17 13:43:22 - Routes, add 193.37.254.13/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:22 - Routes, add 193.37.254.13/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.13:443 . 2024.04.17 13:43:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]193.37.254.13:443 [nonblock] . 2024.04.17 13:43:22 - OpenVPN > TCP connection established with [AF_INET]193.37.254.13:443 . 2024.04.17 13:43:22 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:22 - OpenVPN > TCP_CLIENT link remote: [AF_INET]193.37.254.13:443 . 2024.04.17 13:43:22 - OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.13:443, sid=d69037f2 8e3d5f06 . 2024.04.17 13:43:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:23 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:23 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:23 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Virgo, emailAddress=info@airvpn.org . 2024.04.17 13:43:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:23 - OpenVPN > [Virgo] Peer Connection Initiated with [AF_INET]193.37.254.13:443 . 2024.04.17 13:43:24 - OpenVPN > SENT CONTROL [Virgo]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:24 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:24 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:24 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:24 - Disconnecting . 2024.04.17 13:43:24 - Routes, delete 193.37.254.13/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:24 - Routes, delete 193.37.254.13/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:24 - Connection terminated. I 2024.04.17 13:43:27 - Checking authorization ... . 2024.04.17 13:43:28 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:28 - Connecting to Chalawan (United States of America, Phoenix, Arizona) . 2024.04.17 13:43:28 - Routes, add 193.37.254.21/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:28 - Routes, add 193.37.254.21/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.21:443 . 2024.04.17 13:43:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:28 - OpenVPN > Attempting to establish TCP connection with [AF_INET]193.37.254.21:443 [nonblock] . 2024.04.17 13:43:28 - OpenVPN > TCP connection established with [AF_INET]193.37.254.21:443 . 2024.04.17 13:43:28 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:28 - OpenVPN > TCP_CLIENT link remote: [AF_INET]193.37.254.21:443 . 2024.04.17 13:43:28 - OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.21:443, sid=045ee4d5 c7352fec . 2024.04.17 13:43:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:28 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:28 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:28 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chalawan, emailAddress=info@airvpn.org . 2024.04.17 13:43:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:29 - OpenVPN > [Chalawan] Peer Connection Initiated with [AF_INET]193.37.254.21:443 . 2024.04.17 13:43:30 - OpenVPN > SENT CONTROL [Chalawan]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:30 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:30 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:30 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:30 - Disconnecting . 2024.04.17 13:43:30 - Routes, delete 193.37.254.21/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:30 - Routes, delete 193.37.254.21/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:30 - Connection terminated. I 2024.04.17 13:43:33 - Checking authorization ... . 2024.04.17 13:43:34 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:34 - Connecting to Imai (United States of America, San Jose, California) . 2024.04.17 13:43:34 - Routes, add 198.44.134.6/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:34 - Routes, add 198.44.134.6/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.134.6:443 . 2024.04.17 13:43:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]198.44.134.6:443 [nonblock] . 2024.04.17 13:43:34 - OpenVPN > TCP connection established with [AF_INET]198.44.134.6:443 . 2024.04.17 13:43:34 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]198.44.134.6:443 . 2024.04.17 13:43:34 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.134.6:443, sid=fc88de6b d8abe70c . 2024.04.17 13:43:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:34 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:34 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:34 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Imai, emailAddress=info@airvpn.org . 2024.04.17 13:43:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:34 - OpenVPN > [Imai] Peer Connection Initiated with [AF_INET]198.44.134.6:443 . 2024.04.17 13:43:35 - OpenVPN > SENT CONTROL [Imai]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:35 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:35 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:35 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:35 - Disconnecting . 2024.04.17 13:43:36 - Routes, delete 198.44.134.6/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:36 - Routes, delete 198.44.134.6/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:36 - Connection terminated. I 2024.04.17 13:43:39 - Checking authorization ... . 2024.04.17 13:43:39 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.04.17 13:43:39 - Connecting to Aquila (United States of America, Fremont, California) . 2024.04.17 13:43:39 - Routes, add 23.130.104.132/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:40 - Routes, add 23.130.104.132/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", already exists. . 2024.04.17 13:43:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.04.17 13:43:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.04.17 13:43:40 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.04.17 13:43:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.04.17 13:43:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.04.17 13:43:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443 . 2024.04.17 13:43:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.04.17 13:43:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]23.130.104.132:443 [nonblock] . 2024.04.17 13:43:40 - OpenVPN > TCP connection established with [AF_INET]23.130.104.132:443 . 2024.04.17 13:43:40 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.04.17 13:43:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]23.130.104.132:443 . 2024.04.17 13:43:40 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=2df930c6 e7cf6b0f . 2024.04.17 13:43:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.04.17 13:43:40 - OpenVPN > VERIFY KU OK . 2024.04.17 13:43:40 - OpenVPN > Validating certificate extended key usage . 2024.04.17 13:43:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.04.17 13:43:40 - OpenVPN > VERIFY EKU OK . 2024.04.17 13:43:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org . 2024.04.17 13:43:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.04.17 13:43:40 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]23.130.104.132:443 . 2024.04.17 13:43:41 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1) . 2024.04.17 13:43:41 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.04.17 13:43:41 - Authorization failed. Look at the client area to discover the reason. . 2024.04.17 13:43:41 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.04.17 13:43:41 - Disconnecting . 2024.04.17 13:43:41 - Routes, delete 23.130.104.132/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)". . 2024.04.17 13:43:41 - Routes, delete 23.130.104.132/32 for interface "Ethernet 3 (Realtek PCIe 2.5GbE Family Controller #2)", not exists. . 2024.04.17 13:43:41 - Connection terminated. I 2024.04.17 13:43:44 - Checking authorization ... I 2024.04.17 13:43:45 - Cancel requested. ! 2024.04.17 13:43:45 - Session terminated. ! 2024.04.17 13:43:47 - Deactivation of Network Lock ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "10.1.26.1", "interface_index": 23, "metric": 0, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "0.0.0.0\/0", "gateway": "26.0.0.1", "interface_index": 7, "metric": 9256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "10.1.26.0\/24", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "10.1.26.52\/32", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "10.1.26.255\/32", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "26.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "26.114.49.234\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "26.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "192.168.56.0\/24", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "192.168.56.1\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "192.168.56.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{06A266EC-D67C-499D-8588-7CBC440A0102}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{06A266EC-D67C-499D-8588-7CBC440A0102}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}" }, { "destination": "::\/0", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "2001::\/32", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "2001:0:d5b:9458:18bf:94d:271c:f823\/128", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{06A266EC-D67C-499D-8588-7CBC440A0102}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::18bf:94d:271c:f823\/128", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" }, { "destination": "fe80::2236:ca32:758:b9b4\/128", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "fe80::44fa:f96f:c19e:2193\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}" }, { "destination": "fe80::91bb:d845:fd07:a9d1\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}" }, { "destination": "fe80::baec:2c95:3335:b6de\/128", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{06A266EC-D67C-499D-8588-7CBC440A0102}" }, { "destination": "fe80::c40c:f649:c7fe:d8bc\/128", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 23, "metric": 256, "interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{06A266EC-D67C-499D-8588-7CBC440A0102}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 20, "metric": 256, "interface": "{93123211-9629-4E04-82F0-EA2E4F221468}" } ], "ipv4-default-gateway": "10.1.26.1", "ipv4-default-interface": "{F30C2919-D15A-4D43-940C-FA5859E4F422}", "ipv6-default-gateway": "::", "ipv6-default-interface": "{93123211-9629-4E04-82F0-EA2E4F221468}", "interfaces": [ { "friendly": "Radmin VPN", "id": "{2D54F3BD-A078-4453-B12D-1A18528C5C4D}", "name": "Radmin VPN", "description": "Famatech Radmin VPN Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "540", "bytes_sent": "50077", "support_ipv4": true, "support_ipv6": false, "ips": [ "26.114.49.234" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "VirtualBox Host-Only Network", "id": "{490FB480-4D1C-4BD7-B9FA-F6EAF3CEB9E0}", "name": "VirtualBox Host-Only Network", "description": "VirtualBox Host-Only Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::2236:ca32:758:b9b4", "192.168.56.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 3", "id": "{F30C2919-D15A-4D43-940C-FA5859E4F422}", "name": "Ethernet 3", "description": "Realtek PCIe 2.5GbE Family Controller #2", "type": "Ethernet", "status": "Up", "bytes_received": "3126827389", "bytes_sent": "123426735", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::c40c:f649:c7fe:d8bc", "10.1.26.52" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi 2", "id": "{06A266EC-D67C-499D-8588-7CBC440A0102}", "name": "Wi-Fi 2", "description": "Intel(R) Wi-Fi 6 AX200 160MHz #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::baec:2c95:3335:b6de", "169.254.139.167" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 11", "id": "{594DA09F-2306-4B35-975A-B40C9CA7F82F}", "name": "Local Area Connection* 11", "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::44fa:f96f:c19e:2193", "169.254.70.149" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 12", "id": "{75B7E5DF-256B-4E26-9FB0-A0543DE43017}", "name": "Local Area Connection* 12", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::91bb:d845:fd07:a9d1", "169.254.68.249" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{0A0C1AD8-2A39-11EB-9773-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Teredo Tunneling Pseudo-Interface", "id": "{93123211-9629-4E04-82F0-EA2E4F221468}", "name": "Teredo Tunneling Pseudo-Interface", "description": "Microsoft Teredo Tunneling Adapter", "type": "Tunnel", "status": "Up", "bytes_received": "456", "bytes_sent": "3836", "support_ipv4": false, "support_ipv6": true, "ips": [ "2001:0:d5b:9458:18bf:94d:271c:f823", "fe80::18bf:94d:271c:f823" ], "bind": true, "dns4": null, "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Nac Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Mixed IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Radmin VPN: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Famatech Radmin VPN Ethernet Adapter Physical Address. . . . . . . . . : 02-50-90-78-F2-38 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 26.114.49.234(Preferred) Subnet Mask . . . . . . . . . . . : 255.0.0.0 Default Gateway . . . . . . . . . : 26.0.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter VirtualBox Host-Only Network: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter Physical Address. . . . . . . . . : 0A-00-27-00-00-0B DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::2236:ca32:758:b9b4%11(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.56.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 805961767 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-CD-98-E3-2C-F0-5D-94-86-0A DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet 3: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe 2.5GbE Family Controller #2 Physical Address. . . . . . . . . : 2C-F0-5D-94-86-0A DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::c40c:f649:c7fe:d8bc%23(Preferred) IPv4 Address. . . . . . . . . . . : 10.1.26.52(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Wednesday, April 17, 2024 1:42:44 PM Lease Expires . . . . . . . . . . : Wednesday, April 17, 2024 3:42:41 PM Default Gateway . . . . . . . . . : 10.1.26.1 DHCP Server . . . . . . . . . . . : 10.1.26.1 DHCPv6 IAID . . . . . . . . . . . : 741142621 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-CD-98-E3-2C-F0-5D-94-86-0A DNS Servers . . . . . . . . . . . : 10.1.26.1 8.8.8.8 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Wi-Fi 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Wi-Fi 6 AX200 160MHz #2 Physical Address. . . . . . . . . : E0-D4-E8-78-A0-69 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 Physical Address. . . . . . . . . : E0-D4-E8-78-A0-6A DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 12: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 Physical Address. . . . . . . . . : E2-D4-E8-78-A0-69 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2001:0:d5b:9458:18bf:94d:271c:f823(Preferred) Link-local IPv6 Address . . . . . : fe80::18bf:94d:271c:f823%20(Preferred) Default Gateway . . . . . . . . . : :: DHCPv6 IAID . . . . . . . . . . . : 285212672 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-CD-98-E3-2C-F0-5D-94-86-0A NetBIOS over Tcpip. . . . . . . . : Disabled