. 2024.06.30 12:08:11 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2024.06.30 12:08:11 - Command line arguments (1): path="home" . 2024.06.30 12:08:12 - Reading options from C:\Users\felix\AppData\Local\Eddie\default.profile . 2024.06.30 12:08:13 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.06.30 12:08:13 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.06.30 12:08:13 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.06.30 12:08:14 - Ready . 2024.06.30 12:08:15 - Collect information about AirVPN completed I 2024.06.30 12:08:25 - Session starting. I 2024.06.30 12:08:27 - Checking authorization ... . 2024.06.30 12:08:27 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:08:27 - Connecting to Cujam (Germany, Berlin) . 2024.06.30 12:08:28 - Routes, add 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:28 - Routes, add 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:08:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:08:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:08:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:08:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.217.245:443 . 2024.06.30 12:08:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:08:28 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:08:28 - OpenVPN > UDP link remote: [AF_INET]37.120.217.245:443 . 2024.06.30 12:08:30 - OpenVPN > TLS: Initial packet from [AF_INET]37.120.217.245:443, sid=064118f0 1cff2904 . 2024.06.30 12:08:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:08:30 - OpenVPN > VERIFY KU OK . 2024.06.30 12:08:30 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:08:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:08:30 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:08:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cujam, emailAddress=info@airvpn.org . 2024.06.30 12:08:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:08:32 - OpenVPN > [Cujam] Peer Connection Initiated with [AF_INET]37.120.217.245:443 . 2024.06.30 12:08:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.110.1,dhcp-option DNS6 fde6:7a:7d20:76e::1,tun-ipv6,route-gateway 10.11.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:76e::1055/64 fde6:7a:7d20:76e::1,ifconfig 10.11.110.87 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.06.30 12:08:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:08:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.110.1' . 2024.06.30 12:08:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:76e::1' . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:08:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:08:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:08:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:33 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:08:33 - OpenVPN > open_tun . 2024.06.30 12:08:33 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:08:33 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:08:33 - Disconnecting . 2024.06.30 12:08:33 - Routes, delete 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:33 - Routes, delete 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:08:33 - Connection terminated. I 2024.06.30 12:08:36 - Checking authorization ... . 2024.06.30 12:08:37 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:08:37 - Connecting to Mirzam (Germany, Frankfurt) . 2024.06.30 12:08:38 - Routes, add 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:38 - Routes, add 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:08:38 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:08:38 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:08:38 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:08:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.181:443 . 2024.06.30 12:08:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:08:38 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:08:38 - OpenVPN > UDP link remote: [AF_INET]141.98.102.181:443 . 2024.06.30 12:08:38 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.181:443, sid=47209bc2 5ae3dc02 . 2024.06.30 12:08:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:08:38 - OpenVPN > VERIFY KU OK . 2024.06.30 12:08:38 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:08:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:08:38 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:08:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirzam, emailAddress=info@airvpn.org . 2024.06.30 12:08:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:08:38 - OpenVPN > [Mirzam] Peer Connection Initiated with [AF_INET]141.98.102.181:443 . 2024.06.30 12:08:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.206.1,dhcp-option DNS6 fde6:7a:7d20:18ce::1,tun-ipv6,route-gateway 10.28.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18ce::10ac/64 fde6:7a:7d20:18ce::1,ifconfig 10.28.206.174 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:08:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:08:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.206.1' . 2024.06.30 12:08:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18ce::1' . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:08:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:08:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:08:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:38 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:08:38 - OpenVPN > open_tun . 2024.06.30 12:08:38 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:08:38 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:08:38 - Disconnecting . 2024.06.30 12:08:39 - Routes, delete 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:39 - Routes, delete 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:08:39 - Connection terminated. I 2024.06.30 12:08:42 - Checking authorization ... . 2024.06.30 12:08:43 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:08:43 - Connecting to Dubhe (Germany, Frankfurt) . 2024.06.30 12:08:43 - Routes, add 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:43 - Routes, add 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:08:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:08:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:08:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:08:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443 . 2024.06.30 12:08:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:08:43 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:08:43 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443 . 2024.06.30 12:08:43 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=e1db792b 595ba912 . 2024.06.30 12:08:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:08:43 - OpenVPN > VERIFY KU OK . 2024.06.30 12:08:43 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:08:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:08:43 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:08:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org . 2024.06.30 12:08:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:08:43 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443 . 2024.06.30 12:08:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::1026/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.40 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.06.30 12:08:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:08:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.14.1' . 2024.06.30 12:08:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:160e::1' . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:08:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:08:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:08:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:44 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:08:44 - OpenVPN > open_tun . 2024.06.30 12:08:44 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:08:44 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:08:44 - Disconnecting . 2024.06.30 12:08:44 - Routes, delete 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:44 - Routes, delete 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:08:44 - Connection terminated. I 2024.06.30 12:08:47 - Checking authorization ... . 2024.06.30 12:08:48 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:08:48 - Connecting to Cervantes (Germany, Frankfurt) . 2024.06.30 12:08:48 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:48 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:08:48 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:08:48 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:08:48 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:08:48 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:48 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:48 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:48 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.29:443 . 2024.06.30 12:08:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:08:48 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:08:48 - OpenVPN > UDP link remote: [AF_INET]185.189.112.29:443 . 2024.06.30 12:08:50 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.29:443, sid=66b7541f d5a9bf9d . 2024.06.30 12:08:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:08:50 - OpenVPN > VERIFY KU OK . 2024.06.30 12:08:50 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:08:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:08:50 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:08:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cervantes, emailAddress=info@airvpn.org . 2024.06.30 12:08:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:08:51 - OpenVPN > [Cervantes] Peer Connection Initiated with [AF_INET]185.189.112.29:443 . 2024.06.30 12:08:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.174.1,dhcp-option DNS6 fde6:7a:7d20:9ae::1,tun-ipv6,route-gateway 10.13.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ae::1026/64 fde6:7a:7d20:9ae::1,ifconfig 10.13.174.40 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:08:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:08:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.174.1' . 2024.06.30 12:08:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:9ae::1' . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:08:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:08:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:08:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:51 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:08:51 - OpenVPN > open_tun . 2024.06.30 12:08:51 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:08:51 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:08:51 - Disconnecting . 2024.06.30 12:08:51 - Routes, delete 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:52 - Routes, delete 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:08:52 - Connection terminated. I 2024.06.30 12:08:55 - Checking authorization ... . 2024.06.30 12:08:55 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:08:55 - Connecting to Adhara (Germany, Frankfurt) . 2024.06.30 12:08:56 - Routes, add 185.104.184.45/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:56 - Routes, add 185.104.184.45/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:08:56 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:08:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:08:56 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:08:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:08:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:08:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2024.06.30 12:08:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:08:56 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:08:56 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2024.06.30 12:08:56 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=536e7199 70a17d38 . 2024.06.30 12:08:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:08:56 - OpenVPN > VERIFY KU OK . 2024.06.30 12:08:56 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:08:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:08:56 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:08:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2024.06.30 12:08:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:08:56 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2024.06.30 12:08:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.174.1,dhcp-option DNS6 fde6:7a:7d20:ae::1,tun-ipv6,route-gateway 10.4.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ae::1055/64 fde6:7a:7d20:ae::1,ifconfig 10.4.174.87 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.06.30 12:08:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:08:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.174.1' . 2024.06.30 12:08:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:ae::1' . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:08:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:08:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:08:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:08:56 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:08:56 - OpenVPN > open_tun . 2024.06.30 12:08:56 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:08:56 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:08:56 - Disconnecting . 2024.06.30 12:08:57 - Routes, delete 185.104.184.45/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:08:57 - Routes, delete 185.104.184.45/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:08:57 - Connection terminated. I 2024.06.30 12:09:00 - Checking authorization ... . 2024.06.30 12:09:01 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:01 - Connecting to Errai (Germany, Frankfurt) . 2024.06.30 12:09:01 - Routes, add 185.189.112.13/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:01 - Routes, add 185.189.112.13/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:01 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:01 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.13:443 . 2024.06.30 12:09:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:01 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:01 - OpenVPN > UDP link remote: [AF_INET]185.189.112.13:443 . 2024.06.30 12:09:01 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.13:443, sid=98cccf6f 5444785d . 2024.06.30 12:09:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:04 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:04 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:04 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org . 2024.06.30 12:09:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:10 - OpenVPN > [Errai] Peer Connection Initiated with [AF_INET]185.189.112.13:443 . 2024.06.30 12:09:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.174.1,dhcp-option DNS6 fde6:7a:7d20:cae::1,tun-ipv6,route-gateway 10.16.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:cae::1089/64 fde6:7a:7d20:cae::1,ifconfig 10.16.174.139 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.06.30 12:09:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.174.1' . 2024.06.30 12:09:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:cae::1' . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:10 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:10 - OpenVPN > open_tun . 2024.06.30 12:09:10 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:10 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:10 - Disconnecting . 2024.06.30 12:09:10 - Routes, delete 185.189.112.13/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:10 - Routes, delete 185.189.112.13/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:10 - Connection terminated. I 2024.06.30 12:09:13 - Checking authorization ... . 2024.06.30 12:09:14 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:14 - Connecting to Mesarthim (Germany, Munich) . 2024.06.30 12:09:15 - Routes, add 178.238.229.56/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:15 - Routes, add 178.238.229.56/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.238.229.56:443 . 2024.06.30 12:09:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:15 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:15 - OpenVPN > UDP link remote: [AF_INET]178.238.229.56:443 . 2024.06.30 12:09:15 - OpenVPN > TLS: Initial packet from [AF_INET]178.238.229.56:443, sid=274ef844 2f82af1b . 2024.06.30 12:09:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:15 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:15 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:15 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mesarthim, emailAddress=info@airvpn.org . 2024.06.30 12:09:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:15 - OpenVPN > [Mesarthim] Peer Connection Initiated with [AF_INET]178.238.229.56:443 . 2024.06.30 12:09:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.110.1,dhcp-option DNS6 fde6:7a:7d20:126e::1,tun-ipv6,route-gateway 10.22.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:126e::10e8/64 fde6:7a:7d20:126e::1,ifconfig 10.22.110.234 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.06.30 12:09:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.110.1' . 2024.06.30 12:09:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:126e::1' . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:16 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:16 - OpenVPN > open_tun . 2024.06.30 12:09:16 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:16 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:16 - Disconnecting . 2024.06.30 12:09:16 - Routes, delete 178.238.229.56/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:16 - Routes, delete 178.238.229.56/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:16 - Connection terminated. I 2024.06.30 12:09:20 - Checking authorization ... . 2024.06.30 12:09:20 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:20 - Connecting to Tucana (Germany, Frankfurt) . 2024.06.30 12:09:21 - Routes, add 178.162.212.216/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:21 - Routes, add 178.162.212.216/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:21 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:21 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.212.216:443 . 2024.06.30 12:09:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:21 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:21 - OpenVPN > UDP link remote: [AF_INET]178.162.212.216:443 . 2024.06.30 12:09:21 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.212.216:443, sid=345150ec 7ac07eaf . 2024.06.30 12:09:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:21 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:21 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:21 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tucana, emailAddress=info@airvpn.org . 2024.06.30 12:09:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:21 - OpenVPN > [Tucana] Peer Connection Initiated with [AF_INET]178.162.212.216:443 . 2024.06.30 12:09:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.206.1,dhcp-option DNS6 fde6:7a:7d20:9ce::1,tun-ipv6,route-gateway 10.13.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ce::102b/64 fde6:7a:7d20:9ce::1,ifconfig 10.13.206.45 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.06.30 12:09:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.206.1' . 2024.06.30 12:09:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:9ce::1' . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:21 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:21 - OpenVPN > open_tun . 2024.06.30 12:09:21 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:21 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:21 - Disconnecting . 2024.06.30 12:09:22 - Routes, delete 178.162.212.216/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:22 - Routes, delete 178.162.212.216/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:22 - Connection terminated. I 2024.06.30 12:09:25 - Checking authorization ... . 2024.06.30 12:09:26 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:26 - Connecting to Mirfak (Germany, Frankfurt) . 2024.06.30 12:09:26 - Routes, add 141.98.102.237/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:27 - Routes, add 141.98.102.237/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.06.30 12:09:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:27 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:27 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.06.30 12:09:27 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=47372b3b a83321fa . 2024.06.30 12:09:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:27 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:27 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:27 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 12:09:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:29 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.06.30 12:09:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::109c/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.158 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.06.30 12:09:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.06.30 12:09:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:29 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:29 - OpenVPN > open_tun . 2024.06.30 12:09:29 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:29 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:29 - Disconnecting . 2024.06.30 12:09:30 - Routes, delete 141.98.102.237/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:30 - Routes, delete 141.98.102.237/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:30 - Connection terminated. I 2024.06.30 12:09:33 - Checking authorization ... . 2024.06.30 12:09:34 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:34 - Connecting to Menkalinan (Germany, Frankfurt) . 2024.06.30 12:09:34 - Routes, add 141.98.102.229/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:35 - Routes, add 141.98.102.229/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443 . 2024.06.30 12:09:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:35 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:35 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443 . 2024.06.30 12:09:35 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=3c82151e 75f27c50 . 2024.06.30 12:09:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:35 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:35 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:35 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org . 2024.06.30 12:09:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:35 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443 . 2024.06.30 12:09:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.14.1,dhcp-option DNS6 fde6:7a:7d20:170e::1,tun-ipv6,route-gateway 10.27.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:170e::105e/64 fde6:7a:7d20:170e::1,ifconfig 10.27.14.96 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.06.30 12:09:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.14.1' . 2024.06.30 12:09:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:170e::1' . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:35 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:35 - OpenVPN > open_tun . 2024.06.30 12:09:35 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:35 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:35 - Disconnecting . 2024.06.30 12:09:36 - Routes, delete 141.98.102.229/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:36 - Routes, delete 141.98.102.229/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:36 - Connection terminated. I 2024.06.30 12:09:39 - Checking authorization ... . 2024.06.30 12:09:40 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:09:40 - Connecting to Serpens (Germany, Frankfurt) . 2024.06.30 12:09:40 - Routes, add 178.162.209.173/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:41 - Routes, add 178.162.209.173/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:09:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:09:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:09:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:09:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:09:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:09:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.209.173:443 . 2024.06.30 12:09:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:09:41 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:09:41 - OpenVPN > UDP link remote: [AF_INET]178.162.209.173:443 . 2024.06.30 12:09:41 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.209.173:443, sid=a0ab05fd 3ca16ba9 . 2024.06.30 12:09:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:09:41 - OpenVPN > VERIFY KU OK . 2024.06.30 12:09:41 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:09:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:09:41 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:09:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Serpens, emailAddress=info@airvpn.org . 2024.06.30 12:09:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:09:41 - OpenVPN > [Serpens] Peer Connection Initiated with [AF_INET]178.162.209.173:443 . 2024.06.30 12:09:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.238.1,dhcp-option DNS6 fde6:7a:7d20:7ee::1,tun-ipv6,route-gateway 10.11.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:7ee::100a/64 fde6:7a:7d20:7ee::1,ifconfig 10.11.238.12 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.06.30 12:09:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:09:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.238.1' . 2024.06.30 12:09:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:7ee::1' . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:09:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:09:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:09:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:09:41 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:09:41 - OpenVPN > open_tun . 2024.06.30 12:09:41 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:09:41 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:09:41 - Disconnecting . 2024.06.30 12:09:42 - Routes, delete 178.162.209.173/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:09:42 - Routes, delete 178.162.209.173/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:09:42 - Connection terminated. I 2024.06.30 12:09:44 - Cancel requested. ! 2024.06.30 12:09:44 - Session terminated. I 2024.06.30 12:11:27 - Session starting. I 2024.06.30 12:11:28 - Checking authorization ... . 2024.06.30 12:11:29 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:11:29 - Connecting to Veritate (Germany, Frankfurt) . 2024.06.30 12:11:30 - Routes, add 178.162.204.240/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:30 - Routes, add 178.162.204.240/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:11:30 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:11:30 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:11:30 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:11:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.204.240:443 . 2024.06.30 12:11:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:11:30 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:11:30 - OpenVPN > UDP link remote: [AF_INET]178.162.204.240:443 . 2024.06.30 12:11:30 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.204.240:443, sid=688b1792 7f205d60 . 2024.06.30 12:11:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:11:30 - OpenVPN > VERIFY KU OK . 2024.06.30 12:11:30 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:11:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:11:30 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:11:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Veritate, emailAddress=info@airvpn.org . 2024.06.30 12:11:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:11:30 - OpenVPN > [Veritate] Peer Connection Initiated with [AF_INET]178.162.204.240:443 . 2024.06.30 12:11:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.206.1,dhcp-option DNS6 fde6:7a:7d20:12ce::1,tun-ipv6,route-gateway 10.22.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12ce::1015/64 fde6:7a:7d20:12ce::1,ifconfig 10.22.206.23 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2024.06.30 12:11:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:11:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.206.1' . 2024.06.30 12:11:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12ce::1' . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:11:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:11:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:11:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:30 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:11:30 - OpenVPN > open_tun . 2024.06.30 12:11:30 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:11:30 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:11:30 - Disconnecting . 2024.06.30 12:11:31 - Routes, delete 178.162.204.240/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:31 - Routes, delete 178.162.204.240/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:11:31 - Connection terminated. I 2024.06.30 12:11:34 - Checking authorization ... . 2024.06.30 12:11:35 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:11:35 - Connecting to Alsephina (Germany, Frankfurt) . 2024.06.30 12:11:35 - Routes, add 141.98.102.189/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:36 - Routes, add 141.98.102.189/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:11:36 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:11:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:11:36 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:11:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.189:443 . 2024.06.30 12:11:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:11:36 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:11:36 - OpenVPN > UDP link remote: [AF_INET]141.98.102.189:443 . 2024.06.30 12:11:36 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.189:443, sid=0756a07b 4549c8c2 . 2024.06.30 12:11:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:11:36 - OpenVPN > VERIFY KU OK . 2024.06.30 12:11:36 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:11:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:11:36 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:11:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alsephina, emailAddress=info@airvpn.org . 2024.06.30 12:11:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:11:36 - OpenVPN > [Alsephina] Peer Connection Initiated with [AF_INET]141.98.102.189:443 . 2024.06.30 12:11:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.110.1,dhcp-option DNS6 fde6:7a:7d20:156e::1,tun-ipv6,route-gateway 10.25.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:156e::103d/64 fde6:7a:7d20:156e::1,ifconfig 10.25.110.63 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:11:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:11:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.110.1' . 2024.06.30 12:11:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:156e::1' . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:11:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:11:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:11:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:36 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:11:36 - OpenVPN > open_tun . 2024.06.30 12:11:36 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:11:36 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:11:36 - Disconnecting . 2024.06.30 12:11:37 - Routes, delete 141.98.102.189/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:37 - Routes, delete 141.98.102.189/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:11:37 - Connection terminated. I 2024.06.30 12:11:40 - Checking authorization ... . 2024.06.30 12:11:41 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:11:41 - Connecting to Ogma (Germany, Frankfurt) . 2024.06.30 12:11:41 - Routes, add 185.189.112.21/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:42 - Routes, add 185.189.112.21/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:11:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:11:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:11:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:11:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.21:443 . 2024.06.30 12:11:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:11:42 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:11:42 - OpenVPN > UDP link remote: [AF_INET]185.189.112.21:443 . 2024.06.30 12:11:42 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.21:443, sid=e268cf17 41dc7c9a . 2024.06.30 12:11:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:11:48 - OpenVPN > VERIFY KU OK . 2024.06.30 12:11:48 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:11:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:11:48 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:11:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ogma, emailAddress=info@airvpn.org . 2024.06.30 12:11:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:11:48 - OpenVPN > [Ogma] Peer Connection Initiated with [AF_INET]185.189.112.21:443 . 2024.06.30 12:11:48 - OpenVPN > SENT CONTROL [Ogma]: 'PUSH_REQUEST' (status=1) . 2024.06.30 12:11:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.174.1,dhcp-option DNS6 fde6:7a:7d20:15ae::1,tun-ipv6,route-gateway 10.25.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15ae::1027/64 fde6:7a:7d20:15ae::1,ifconfig 10.25.174.41 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.06.30 12:11:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:11:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.174.1' . 2024.06.30 12:11:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:15ae::1' . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:11:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:11:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:11:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:48 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:11:48 - OpenVPN > open_tun . 2024.06.30 12:11:48 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:11:48 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:11:48 - Disconnecting . 2024.06.30 12:11:49 - Routes, delete 185.189.112.21/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:49 - Routes, delete 185.189.112.21/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:11:49 - Connection terminated. I 2024.06.30 12:11:52 - Checking authorization ... . 2024.06.30 12:11:53 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:11:53 - Connecting to Taiyi (Germany, Berlin) . 2024.06.30 12:11:53 - Routes, add 83.143.245.53/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:53 - Routes, add 83.143.245.53/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:11:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:11:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:11:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:11:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:11:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:11:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]83.143.245.53:443 . 2024.06.30 12:11:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:11:53 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:11:53 - OpenVPN > UDP link remote: [AF_INET]83.143.245.53:443 . 2024.06.30 12:11:53 - OpenVPN > TLS: Initial packet from [AF_INET]83.143.245.53:443, sid=fa752210 9f82a791 . 2024.06.30 12:11:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:11:53 - OpenVPN > VERIFY KU OK . 2024.06.30 12:11:53 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:11:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:11:53 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:11:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Taiyi, emailAddress=info@airvpn.org . 2024.06.30 12:11:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:11:56 - OpenVPN > [Taiyi] Peer Connection Initiated with [AF_INET]83.143.245.53:443 . 2024.06.30 12:11:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.142.1,dhcp-option DNS6 fde6:7a:7d20:158e::1,tun-ipv6,route-gateway 10.25.142.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:158e::1042/64 fde6:7a:7d20:158e::1,ifconfig 10.25.142.68 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:11:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:11:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.142.1' . 2024.06.30 12:11:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:158e::1' . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:11:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:11:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:11:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:11:56 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:11:56 - OpenVPN > open_tun . 2024.06.30 12:11:56 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:11:56 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:11:56 - Disconnecting . 2024.06.30 12:11:56 - Routes, delete 83.143.245.53/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:11:56 - Routes, delete 83.143.245.53/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:11:56 - Connection terminated. I 2024.06.30 12:11:59 - Checking authorization ... . 2024.06.30 12:12:00 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:12:00 - Connecting to Intercrus (Germany, Frankfurt) . 2024.06.30 12:12:01 - Routes, add 178.162.204.236/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:01 - Routes, add 178.162.204.236/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:12:01 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:12:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:12:01 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:12:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.204.236:443 . 2024.06.30 12:12:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:12:01 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:12:01 - OpenVPN > UDP link remote: [AF_INET]178.162.204.236:443 . 2024.06.30 12:12:01 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.204.236:443, sid=8eda1c2a c3480cb0 . 2024.06.30 12:12:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:12:01 - OpenVPN > VERIFY KU OK . 2024.06.30 12:12:01 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:12:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:12:01 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:12:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Intercrus, emailAddress=info@airvpn.org . 2024.06.30 12:12:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:12:01 - OpenVPN > [Intercrus] Peer Connection Initiated with [AF_INET]178.162.204.236:443 . 2024.06.30 12:12:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.174.1,dhcp-option DNS6 fde6:7a:7d20:6ae::1,tun-ipv6,route-gateway 10.10.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6ae::1065/64 fde6:7a:7d20:6ae::1,ifconfig 10.10.174.103 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:12:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:12:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.174.1' . 2024.06.30 12:12:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6ae::1' . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:12:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:12:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:12:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:01 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:12:01 - OpenVPN > open_tun . 2024.06.30 12:12:01 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:12:01 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:12:01 - Disconnecting . 2024.06.30 12:12:02 - Routes, delete 178.162.204.236/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:02 - Routes, delete 178.162.204.236/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:12:02 - Connection terminated. I 2024.06.30 12:12:05 - Checking authorization ... . 2024.06.30 12:12:06 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:12:06 - Connecting to Mirzam (Germany, Frankfurt) . 2024.06.30 12:12:06 - Routes, add 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:07 - Routes, add 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:12:07 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:12:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:12:07 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:12:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.181:443 . 2024.06.30 12:12:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:12:07 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:12:07 - OpenVPN > UDP link remote: [AF_INET]141.98.102.181:443 . 2024.06.30 12:12:07 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.181:443, sid=2240b128 c8472900 . 2024.06.30 12:12:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:12:07 - OpenVPN > VERIFY KU OK . 2024.06.30 12:12:07 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:12:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:12:07 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:12:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirzam, emailAddress=info@airvpn.org . 2024.06.30 12:12:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:12:07 - OpenVPN > [Mirzam] Peer Connection Initiated with [AF_INET]141.98.102.181:443 . 2024.06.30 12:12:07 - OpenVPN > SENT CONTROL [Mirzam]: 'PUSH_REQUEST' (status=1) . 2024.06.30 12:12:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.206.1,dhcp-option DNS6 fde6:7a:7d20:18ce::1,tun-ipv6,route-gateway 10.28.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18ce::10ac/64 fde6:7a:7d20:18ce::1,ifconfig 10.28.206.174 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:12:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:12:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.206.1' . 2024.06.30 12:12:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18ce::1' . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:12:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:12:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:12:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:07 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:12:07 - OpenVPN > open_tun . 2024.06.30 12:12:07 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:12:07 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:12:07 - Disconnecting . 2024.06.30 12:12:08 - Routes, delete 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:08 - Routes, delete 141.98.102.181/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:12:08 - Connection terminated. I 2024.06.30 12:12:11 - Checking authorization ... . 2024.06.30 12:12:12 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:12:12 - Connecting to Dubhe (Germany, Frankfurt) . 2024.06.30 12:12:12 - Routes, add 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:12 - Routes, add 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:12:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:12:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:12:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:12:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443 . 2024.06.30 12:12:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:12:13 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:12:13 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443 . 2024.06.30 12:12:13 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=abd1fc90 e300a7de . 2024.06.30 12:12:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:12:13 - OpenVPN > VERIFY KU OK . 2024.06.30 12:12:13 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:12:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:12:13 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:12:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org . 2024.06.30 12:12:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:12:13 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443 . 2024.06.30 12:12:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::1026/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.40 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.06.30 12:12:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:12:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.14.1' . 2024.06.30 12:12:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:160e::1' . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:12:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:12:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:12:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:13 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:12:13 - OpenVPN > open_tun . 2024.06.30 12:12:13 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:12:13 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:12:13 - Disconnecting . 2024.06.30 12:12:13 - Routes, delete 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:14 - Routes, delete 141.98.102.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:12:14 - Connection terminated. I 2024.06.30 12:12:17 - Checking authorization ... . 2024.06.30 12:12:17 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:12:17 - Connecting to Cervantes (Germany, Frankfurt) . 2024.06.30 12:12:18 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:18 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:12:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:12:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:12:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:12:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.29:443 . 2024.06.30 12:12:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:12:18 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:12:18 - OpenVPN > UDP link remote: [AF_INET]185.189.112.29:443 . 2024.06.30 12:12:18 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.29:443, sid=fa66af76 a4b4ae10 . 2024.06.30 12:12:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:12:18 - OpenVPN > VERIFY KU OK . 2024.06.30 12:12:18 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:12:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:12:18 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:12:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cervantes, emailAddress=info@airvpn.org . 2024.06.30 12:12:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:12:21 - OpenVPN > [Cervantes] Peer Connection Initiated with [AF_INET]185.189.112.29:443 . 2024.06.30 12:12:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.174.1,dhcp-option DNS6 fde6:7a:7d20:9ae::1,tun-ipv6,route-gateway 10.13.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ae::1026/64 fde6:7a:7d20:9ae::1,ifconfig 10.13.174.40 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.06.30 12:12:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:12:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.174.1' . 2024.06.30 12:12:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:9ae::1' . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:12:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:12:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:12:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:21 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:12:21 - OpenVPN > open_tun . 2024.06.30 12:12:21 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:12:21 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:12:21 - Disconnecting . 2024.06.30 12:12:21 - Routes, delete 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:22 - Routes, delete 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:12:22 - Connection terminated. I 2024.06.30 12:12:25 - Checking authorization ... . 2024.06.30 12:12:25 - Using WinTun network interface "VPN - VPN Client (VPN Client Adapter - VPN)" ! 2024.06.30 12:12:25 - Connecting to Cujam (Germany, Berlin) . 2024.06.30 12:12:26 - Routes, add 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:26 - Routes, add 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.06.30 12:12:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.06.30 12:12:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.06.30 12:12:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.06.30 12:12:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.06.30 12:12:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.06.30 12:12:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.217.245:443 . 2024.06.30 12:12:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.06.30 12:12:26 - OpenVPN > UDP link local: (not bound) . 2024.06.30 12:12:26 - OpenVPN > UDP link remote: [AF_INET]37.120.217.245:443 . 2024.06.30 12:12:27 - OpenVPN > TLS: Initial packet from [AF_INET]37.120.217.245:443, sid=eb822442 ecf8aa02 . 2024.06.30 12:12:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:12:28 - OpenVPN > VERIFY KU OK . 2024.06.30 12:12:28 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:12:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:12:28 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:12:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cujam, emailAddress=info@airvpn.org . 2024.06.30 12:12:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:12:28 - OpenVPN > [Cujam] Peer Connection Initiated with [AF_INET]37.120.217.245:443 . 2024.06.30 12:12:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.110.1,dhcp-option DNS6 fde6:7a:7d20:76e::1,tun-ipv6,route-gateway 10.11.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:76e::1055/64 fde6:7a:7d20:76e::1,ifconfig 10.11.110.87 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.06.30 12:12:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.06.30 12:12:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.110.1' . 2024.06.30 12:12:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:76e::1' . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.06.30 12:12:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.06.30 12:12:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.06.30 12:12:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:12:28 - OpenVPN > interactive service msg_channel=0 . 2024.06.30 12:12:28 - OpenVPN > open_tun . 2024.06.30 12:12:28 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.06.30 12:12:28 - OpenVPN > Exiting due to fatal error ! 2024.06.30 12:12:28 - Disconnecting . 2024.06.30 12:12:28 - Routes, delete 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.06.30 12:12:29 - Routes, delete 37.120.217.245/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2024.06.30 12:12:29 - Connection terminated. I 2024.06.30 12:12:31 - Cancel requested. ! 2024.06.30 12:12:31 - Session terminated.