Eddie System/Environment Report - 02.07.2024 - 15:43 UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.22621.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Administrator\AppData\Local\Eddie\default.profile Data path: C:\Users\Administrator\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: fe80::1, 192.168.2.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 18 ms Test Ping IPv6: 49 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.startlast: True proxy.mode: none dns.check: False ---------------------------- Logs: . 2024.06.30 12:03:38 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:03:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 12:03:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:03:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:03:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 12:11:54 - Collect information about AirVPN completed . 2024.06.30 12:41:54 - Collect information about AirVPN completed . 2024.06.30 12:57:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 12:57:58 - OpenVPN > VERIFY KU OK . 2024.06.30 12:57:58 - OpenVPN > Validating certificate extended key usage . 2024.06.30 12:57:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 12:57:58 - OpenVPN > VERIFY EKU OK . 2024.06.30 12:57:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 12:57:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:57:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 12:57:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 13:11:54 - Collect information about AirVPN completed . 2024.06.30 13:42:07 - Collect information about AirVPN completed . 2024.06.30 13:52:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 13:52:18 - OpenVPN > VERIFY KU OK . 2024.06.30 13:52:18 - OpenVPN > Validating certificate extended key usage . 2024.06.30 13:52:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 13:52:18 - OpenVPN > VERIFY EKU OK . 2024.06.30 13:52:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 13:52:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 13:52:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 13:52:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 14:11:57 - Collect information about AirVPN completed . 2024.06.30 14:41:59 - Collect information about AirVPN completed . 2024.06.30 14:46:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 14:46:41 - OpenVPN > VERIFY KU OK . 2024.06.30 14:46:41 - OpenVPN > Validating certificate extended key usage . 2024.06.30 14:46:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 14:46:41 - OpenVPN > VERIFY EKU OK . 2024.06.30 14:46:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 14:46:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 14:46:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 14:46:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 15:11:59 - Collect information about AirVPN completed . 2024.06.30 15:41:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 15:41:01 - OpenVPN > VERIFY KU OK . 2024.06.30 15:41:01 - OpenVPN > Validating certificate extended key usage . 2024.06.30 15:41:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 15:41:01 - OpenVPN > VERIFY EKU OK . 2024.06.30 15:41:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 15:41:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 15:41:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 15:41:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 15:41:58 - Collect information about AirVPN completed . 2024.06.30 16:11:58 - Collect information about AirVPN completed . 2024.06.30 16:35:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 16:35:22 - OpenVPN > VERIFY KU OK . 2024.06.30 16:35:22 - OpenVPN > Validating certificate extended key usage . 2024.06.30 16:35:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 16:35:22 - OpenVPN > VERIFY EKU OK . 2024.06.30 16:35:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 16:35:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 16:35:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 16:35:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 16:42:02 - Collect information about AirVPN completed . 2024.06.30 17:12:04 - Collect information about AirVPN completed . 2024.06.30 17:29:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 17:29:41 - OpenVPN > VERIFY KU OK . 2024.06.30 17:29:41 - OpenVPN > Validating certificate extended key usage . 2024.06.30 17:29:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 17:29:41 - OpenVPN > VERIFY EKU OK . 2024.06.30 17:29:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 17:29:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 17:29:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 17:29:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 17:42:08 - Collect information about AirVPN completed . 2024.06.30 18:12:10 - Collect information about AirVPN completed . 2024.06.30 18:24:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 18:24:01 - OpenVPN > VERIFY KU OK . 2024.06.30 18:24:01 - OpenVPN > Validating certificate extended key usage . 2024.06.30 18:24:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 18:24:01 - OpenVPN > VERIFY EKU OK . 2024.06.30 18:24:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 18:24:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 18:24:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 18:24:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 18:42:14 - Collect information about AirVPN completed . 2024.06.30 19:12:20 - Collect information about AirVPN completed . 2024.06.30 19:18:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 19:18:22 - OpenVPN > VERIFY KU OK . 2024.06.30 19:18:22 - OpenVPN > Validating certificate extended key usage . 2024.06.30 19:18:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 19:18:22 - OpenVPN > VERIFY EKU OK . 2024.06.30 19:18:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 19:18:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 19:18:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 19:18:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 19:42:20 - Collect information about AirVPN completed . 2024.06.30 20:12:21 - Collect information about AirVPN completed . 2024.06.30 20:12:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 20:12:42 - OpenVPN > VERIFY KU OK . 2024.06.30 20:12:42 - OpenVPN > Validating certificate extended key usage . 2024.06.30 20:12:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 20:12:42 - OpenVPN > VERIFY EKU OK . 2024.06.30 20:12:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 20:12:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 20:12:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 20:12:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 20:42:31 - Collect information about AirVPN completed . 2024.06.30 21:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 21:07:02 - OpenVPN > VERIFY KU OK . 2024.06.30 21:07:02 - OpenVPN > Validating certificate extended key usage . 2024.06.30 21:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 21:07:02 - OpenVPN > VERIFY EKU OK . 2024.06.30 21:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 21:07:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 21:07:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 21:07:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 21:12:34 - Collect information about AirVPN completed . 2024.06.30 21:42:38 - Collect information about AirVPN completed . 2024.06.30 22:01:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 22:01:22 - OpenVPN > VERIFY KU OK . 2024.06.30 22:01:22 - OpenVPN > Validating certificate extended key usage . 2024.06.30 22:01:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 22:01:22 - OpenVPN > VERIFY EKU OK . 2024.06.30 22:01:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 22:01:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 22:01:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 22:01:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 22:12:43 - Collect information about AirVPN completed . 2024.06.30 22:42:45 - Collect information about AirVPN completed . 2024.06.30 22:55:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 22:55:41 - OpenVPN > VERIFY KU OK . 2024.06.30 22:55:41 - OpenVPN > Validating certificate extended key usage . 2024.06.30 22:55:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 22:55:41 - OpenVPN > VERIFY EKU OK . 2024.06.30 22:55:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 22:55:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 22:55:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 22:55:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.06.30 23:12:46 - Collect information about AirVPN completed . 2024.06.30 23:42:47 - Collect information about AirVPN completed . 2024.06.30 23:50:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.06.30 23:50:01 - OpenVPN > VERIFY KU OK . 2024.06.30 23:50:01 - OpenVPN > Validating certificate extended key usage . 2024.06.30 23:50:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.06.30 23:50:01 - OpenVPN > VERIFY EKU OK . 2024.06.30 23:50:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.06.30 23:50:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 23:50:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.06.30 23:50:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 00:12:50 - Collect information about AirVPN completed . 2024.07.01 00:42:53 - Collect information about AirVPN completed . 2024.07.01 00:44:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.01 00:44:21 - OpenVPN > VERIFY KU OK . 2024.07.01 00:44:21 - OpenVPN > Validating certificate extended key usage . 2024.07.01 00:44:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.01 00:44:21 - OpenVPN > VERIFY EKU OK . 2024.07.01 00:44:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.01 00:44:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 00:44:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 00:44:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 01:12:56 - Collect information about AirVPN completed . 2024.07.01 01:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.01 01:38:41 - OpenVPN > VERIFY KU OK . 2024.07.01 01:38:41 - OpenVPN > Validating certificate extended key usage . 2024.07.01 01:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.01 01:38:41 - OpenVPN > VERIFY EKU OK . 2024.07.01 01:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.01 01:38:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 01:38:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 01:38:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 01:42:59 - Collect information about AirVPN completed . 2024.07.01 02:13:02 - Collect information about AirVPN completed . 2024.07.01 02:33:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.01 02:33:01 - OpenVPN > VERIFY KU OK . 2024.07.01 02:33:01 - OpenVPN > Validating certificate extended key usage . 2024.07.01 02:33:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.01 02:33:01 - OpenVPN > VERIFY EKU OK . 2024.07.01 02:33:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.01 02:33:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 02:33:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 02:33:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 02:43:05 - Collect information about AirVPN completed . 2024.07.01 03:13:07 - Collect information about AirVPN completed . 2024.07.01 03:27:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.01 03:27:21 - OpenVPN > VERIFY KU OK . 2024.07.01 03:27:21 - OpenVPN > Validating certificate extended key usage . 2024.07.01 03:27:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.01 03:27:21 - OpenVPN > VERIFY EKU OK . 2024.07.01 03:27:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.01 03:27:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 03:27:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 03:27:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 03:43:11 - Collect information about AirVPN completed . 2024.07.01 04:13:13 - Collect information about AirVPN completed . 2024.07.01 04:21:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.01 04:21:41 - OpenVPN > VERIFY KU OK . 2024.07.01 04:21:41 - OpenVPN > Validating certificate extended key usage . 2024.07.01 04:21:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.01 04:21:41 - OpenVPN > VERIFY EKU OK . 2024.07.01 04:21:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.01 04:21:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 04:21:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.01 04:21:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.01 04:43:16 - Collect information about AirVPN completed . 2024.07.01 05:10:09 - OpenVPN > [Mirfak] Inactivity timeout (--ping-restart), restarting . 2024.07.01 05:10:09 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2024.07.01 05:10:09 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.01 05:10:09 - Disconnecting . 2024.07.01 05:10:09 - Sending soft termination signal . 2024.07.01 05:10:14 - OpenVPN > Closing TUN/TAP interface . 2024.07.01 05:10:14 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.01 05:10:14 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.01 05:10:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.01 05:10:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.01 05:10:14 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.01 05:10:14 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:14 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:14 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:14 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.01 05:10:14 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:15 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.01 05:10:15 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.01 05:10:15 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.01 05:10:15 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.01 05:10:15 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.01 05:10:15 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.01 05:10:15 - DNS leak protection with packet filtering disabled. . 2024.07.01 05:10:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.01 05:10:15 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.01 05:10:15 - Connection terminated. I 2024.07.01 05:10:18 - Checking authorization ... W 2024.07.01 05:11:42 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached) . 2024.07.01 05:11:42 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.01 05:11:42 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.01 05:11:42 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.01 05:11:42 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.01 05:11:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.01 05:11:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.01 05:11:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.01 05:11:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.01 05:11:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.01 05:11:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.01 05:11:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.01 05:11:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.01 05:11:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.01 05:11:42 - OpenVPN > UDP link local: (not bound) . 2024.07.01 05:11:42 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.01 05:12:14 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2024.07.01 05:12:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.01 05:12:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.07.01 05:12:20 - Disconnecting . 2024.07.01 05:12:20 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.01 05:12:20 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.01 05:12:20 - Connection terminated. I 2024.07.01 05:12:23 - Checking authorization ... W 2024.07.01 05:13:47 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached) . 2024.07.01 05:13:47 - Flushing DNS ! 2024.07.01 05:13:48 - Session terminated. ! 2024.07.01 05:13:49 - Deactivation of Network Lock . 2024.07.01 05:15:12 - Cannot retrieve information about AirVPN: Fetch url error:Timeout was reached . 2024.07.01 05:45:15 - Cannot retrieve information about AirVPN: Fetch url error:Timeout was reached . 2024.07.01 06:15:17 - Cannot retrieve information about AirVPN: Fetch url error:Timeout was reached . 2024.07.01 18:14:06 - Collect information about AirVPN completed . 2024.07.01 18:44:07 - Collect information about AirVPN completed . 2024.07.01 19:14:07 - Collect information about AirVPN completed . 2024.07.02 04:48:19 - Above log line repeated 10 times more . 2024.07.02 04:48:20 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2024.07.02 05:18:21 - Collect information about AirVPN completed . 2024.07.02 05:48:21 - Collect information about AirVPN completed . 2024.07.02 06:18:22 - Collect information about AirVPN completed . 2024.07.02 15:56:12 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2024.07.02 16:26:13 - Collect information about AirVPN completed ! 2024.07.02 16:49:18 - Activation of Network Lock - Windows Filtering Platform I 2024.07.02 16:49:19 - Session starting. I 2024.07.02 16:49:19 - Checking authorization ... . 2024.07.02 16:49:20 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.02 16:49:20 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 16:49:20 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 16:49:20 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:49:20 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 16:49:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 16:49:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 16:49:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 16:49:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:49:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:49:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:49:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:49:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 16:49:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 16:49:20 - OpenVPN > UDP link local: (not bound) . 2024.07.02 16:49:20 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 16:49:35 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=8a687f08 3f2c2478 . 2024.07.02 16:49:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 16:49:35 - OpenVPN > VERIFY KU OK . 2024.07.02 16:49:35 - OpenVPN > Validating certificate extended key usage . 2024.07.02 16:49:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 16:49:35 - OpenVPN > VERIFY EKU OK . 2024.07.02 16:49:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 16:49:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 16:49:35 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 16:49:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.07.02 16:49:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 16:49:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 16:49:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 16:49:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 16:49:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 16:49:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:49:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:49:35 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 16:49:35 - OpenVPN > open_tun . 2024.07.02 16:49:35 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 16:49:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 16:49:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 16:49:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 16:49:35 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:49:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 16:49:35 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 16:49:35 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:49:35 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 16:49:35 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 16:49:35 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:49:35 - OpenVPN > Initialization Sequence Completed . 2024.07.02 16:49:35 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 16:49:35 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 16:49:35 - DNS leak protection with packet filtering enabled. . 2024.07.02 16:49:35 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 16:49:35 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:49:35 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 16:49:35 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:49:35 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:49:36 - Flushing DNS I 2024.07.02 16:49:36 - Checking route IPv4 . 2024.07.02 16:50:03 - Checking route (4° try) . 2024.07.02 16:50:28 - Checking route (5° try) E 2024.07.02 16:50:49 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.07.02 16:50:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:50:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:50:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:50:49 - Above log line repeated 43 times more ! 2024.07.02 16:50:49 - Disconnecting . 2024.07.02 16:50:49 - Sending soft termination signal . 2024.07.02 16:50:52 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 16:50:54 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 16:50:54 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 16:50:54 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:50:54 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 16:50:54 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 16:50:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 16:50:54 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:54 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:54 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:55 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:55 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:50:55 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:55 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:55 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 16:50:55 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:50:55 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:50:55 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:50:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:50:55 - DNS leak protection with packet filtering disabled. . 2024.07.02 16:50:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 16:50:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 16:50:55 - Connection terminated. I 2024.07.02 16:50:58 - Checking authorization ... . 2024.07.02 16:50:58 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 16:50:58 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 16:50:58 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:50:58 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 16:50:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 16:50:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 16:50:58 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 16:50:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:50:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:50:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:50:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:50:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 16:50:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 16:50:58 - OpenVPN > UDP link local: (not bound) . 2024.07.02 16:50:58 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 16:50:58 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=ba5cbf2a 46d4ad7e . 2024.07.02 16:50:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 16:50:58 - OpenVPN > VERIFY KU OK . 2024.07.02 16:50:58 - OpenVPN > Validating certificate extended key usage . 2024.07.02 16:50:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 16:50:58 - OpenVPN > VERIFY EKU OK . 2024.07.02 16:50:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 16:50:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 16:50:59 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 16:50:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2024.07.02 16:50:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 16:50:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 16:50:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 16:50:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 16:50:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 16:50:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:50:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:50:59 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 16:50:59 - OpenVPN > open_tun . 2024.07.02 16:50:59 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 16:50:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 16:50:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 16:50:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 16:50:59 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:50:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 16:50:59 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 16:50:59 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:50:59 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 16:50:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 16:50:59 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:50:59 - OpenVPN > Initialization Sequence Completed . 2024.07.02 16:50:59 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 16:50:59 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 16:50:59 - DNS leak protection with packet filtering enabled. . 2024.07.02 16:50:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 16:50:59 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:50:59 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 16:50:59 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:50:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:50:59 - Flushing DNS I 2024.07.02 16:50:59 - Checking route IPv4 . 2024.07.02 16:51:27 - Checking route (4° try) . 2024.07.02 16:51:52 - Checking route (5° try) E 2024.07.02 16:52:13 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.07.02 16:52:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:52:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:52:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:52:13 - Above log line repeated 41 times more ! 2024.07.02 16:52:13 - Disconnecting . 2024.07.02 16:52:13 - Sending soft termination signal . 2024.07.02 16:52:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 16:52:17 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 16:52:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 16:52:17 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:52:17 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 16:52:17 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 16:52:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 16:52:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:17 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:17 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:17 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:52:18 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:18 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:52:18 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 16:52:18 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:52:18 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:52:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:52:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:52:18 - DNS leak protection with packet filtering disabled. . 2024.07.02 16:52:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 16:52:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 16:52:18 - Connection terminated. I 2024.07.02 16:52:19 - Cancel requested. ! 2024.07.02 16:52:19 - Session terminated. ! 2024.07.02 16:52:20 - Deactivation of Network Lock . 2024.07.02 16:56:13 - Collect information about AirVPN completed ! 2024.07.02 16:57:59 - Activation of Network Lock - Windows Filtering Platform I 2024.07.02 16:58:02 - Session starting. I 2024.07.02 16:58:02 - Checking authorization ... . 2024.07.02 16:58:03 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.02 16:58:03 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 16:58:03 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 16:58:03 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:58:03 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 16:58:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 16:58:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 16:58:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 16:58:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:58:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:58:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:58:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:58:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 16:58:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 16:58:03 - OpenVPN > UDP link local: (not bound) . 2024.07.02 16:58:03 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 16:58:09 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=ac8afe67 4c54eb16 . 2024.07.02 16:58:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 16:58:09 - OpenVPN > VERIFY KU OK . 2024.07.02 16:58:09 - OpenVPN > Validating certificate extended key usage . 2024.07.02 16:58:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 16:58:09 - OpenVPN > VERIFY EKU OK . 2024.07.02 16:58:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 16:58:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 16:58:09 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 16:58:09 - OpenVPN > SENT CONTROL [Mirfak]: 'PUSH_REQUEST' (status=1) . 2024.07.02 16:58:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.07.02 16:58:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 16:58:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 16:58:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 16:58:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 16:58:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 16:58:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:58:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:58:09 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 16:58:09 - OpenVPN > open_tun . 2024.07.02 16:58:09 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 16:58:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 16:58:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 16:58:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 16:58:09 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:58:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 16:58:09 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 16:58:09 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:58:09 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 16:58:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 16:58:09 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:58:09 - OpenVPN > Initialization Sequence Completed . 2024.07.02 16:58:09 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 16:58:09 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 16:58:09 - DNS leak protection with packet filtering enabled. . 2024.07.02 16:58:10 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 16:58:10 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:58:10 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 16:58:10 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:58:10 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:58:10 - Flushing DNS I 2024.07.02 16:58:10 - Checking route IPv4 . 2024.07.02 16:58:37 - Checking route (4° try) . 2024.07.02 16:59:02 - Checking route (5° try) E 2024.07.02 16:59:23 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.07.02 16:59:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:23 - Above log line repeated 36 times more ! 2024.07.02 16:59:23 - Disconnecting . 2024.07.02 16:59:23 - Sending soft termination signal . 2024.07.02 16:59:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 16:59:29 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 16:59:29 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 16:59:29 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:59:29 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 16:59:29 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 16:59:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 16:59:29 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:59:29 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:29 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 16:59:29 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:59:29 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 16:59:29 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:59:29 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 16:59:29 - DNS leak protection with packet filtering disabled. . 2024.07.02 16:59:29 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 16:59:29 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 16:59:29 - Connection terminated. I 2024.07.02 16:59:32 - Checking authorization ... . 2024.07.02 16:59:33 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 16:59:33 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 16:59:33 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 16:59:33 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 16:59:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 16:59:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 16:59:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 16:59:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:59:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:59:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 16:59:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 16:59:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 16:59:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 16:59:33 - OpenVPN > UDP link local: (not bound) . 2024.07.02 16:59:33 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 16:59:33 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=e9a50f44 500e4e39 . 2024.07.02 16:59:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 16:59:33 - OpenVPN > VERIFY KU OK . 2024.07.02 16:59:33 - OpenVPN > Validating certificate extended key usage . 2024.07.02 16:59:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 16:59:33 - OpenVPN > VERIFY EKU OK . 2024.07.02 16:59:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 16:59:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 16:59:33 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 16:59:33 - OpenVPN > SENT CONTROL [Mirfak]: 'PUSH_REQUEST' (status=1) . 2024.07.02 16:59:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2024.07.02 16:59:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 16:59:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 16:59:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 16:59:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 16:59:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 16:59:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:59:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 16:59:33 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 16:59:33 - OpenVPN > open_tun . 2024.07.02 16:59:33 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 16:59:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 16:59:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 16:59:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 16:59:33 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:59:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 16:59:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 16:59:33 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 16:59:33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 16:59:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 16:59:33 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 16:59:33 - OpenVPN > Initialization Sequence Completed . 2024.07.02 16:59:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 16:59:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 16:59:33 - DNS leak protection with packet filtering enabled. . 2024.07.02 16:59:33 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 16:59:33 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:59:33 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 16:59:34 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 16:59:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 16:59:34 - Flushing DNS I 2024.07.02 16:59:34 - Checking route IPv4 . 2024.07.02 16:59:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 16:59:58 - Above log line repeated 39 times more ! 2024.07.02 16:59:58 - Disconnecting . 2024.07.02 16:59:58 - Sending soft termination signal . 2024.07.02 17:00:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 17:00:03 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 17:00:03 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 17:00:03 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:00:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 17:00:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 17:00:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 17:00:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:03 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:03 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:04 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:00:04 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:04 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:00:04 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 17:00:04 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:00:04 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:00:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:00:04 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:00:04 - DNS leak protection with packet filtering disabled. . 2024.07.02 17:00:04 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 17:00:04 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 17:00:04 - Connection terminated. I 2024.07.02 17:00:04 - Cancel requested. ! 2024.07.02 17:00:04 - Session terminated. ! 2024.07.02 17:06:34 - Deactivation of Network Lock ! 2024.07.02 17:07:06 - Activation of Network Lock - Windows Filtering Platform I 2024.07.02 17:07:07 - Session starting. I 2024.07.02 17:07:08 - Checking authorization ... . 2024.07.02 17:07:08 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.02 17:07:08 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 17:07:08 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 17:07:08 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:07:08 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 17:07:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 17:07:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 17:07:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 17:07:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:07:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:07:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:07:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:07:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 17:07:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 17:07:08 - OpenVPN > UDP link local: (not bound) . 2024.07.02 17:07:08 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 17:07:15 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=36a44d48 8c20cfed . 2024.07.02 17:07:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 17:07:15 - OpenVPN > VERIFY KU OK . 2024.07.02 17:07:15 - OpenVPN > Validating certificate extended key usage . 2024.07.02 17:07:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 17:07:15 - OpenVPN > VERIFY EKU OK . 2024.07.02 17:07:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 17:07:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 17:07:15 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 17:07:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.07.02 17:07:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 17:07:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 17:07:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 17:07:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 17:07:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 17:07:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:07:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:07:15 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 17:07:15 - OpenVPN > open_tun . 2024.07.02 17:07:15 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 17:07:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 17:07:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 17:07:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 17:07:15 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:07:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 17:07:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 17:07:15 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:07:15 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 17:07:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 17:07:15 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:07:15 - OpenVPN > Initialization Sequence Completed . 2024.07.02 17:07:15 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 17:07:15 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 17:07:15 - DNS leak protection with packet filtering enabled. . 2024.07.02 17:07:15 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 17:07:15 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:07:15 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 17:07:15 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:07:15 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:15 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:15 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:15 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:16 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:16 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:16 - Flushing DNS I 2024.07.02 17:07:16 - Checking route IPv4 . 2024.07.02 17:07:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:07:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:07:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:07:40 - Above log line repeated 39 times more ! 2024.07.02 17:07:40 - Disconnecting . 2024.07.02 17:07:40 - Sending soft termination signal . 2024.07.02 17:07:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 17:07:45 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 17:07:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 17:07:45 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:07:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 17:07:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 17:07:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 17:07:45 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:07:45 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:07:45 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 17:07:45 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:07:45 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:07:45 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:07:45 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:07:45 - DNS leak protection with packet filtering disabled. . 2024.07.02 17:07:45 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 17:07:45 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 17:07:45 - Connection terminated. I 2024.07.02 17:07:45 - Cancel requested. ! 2024.07.02 17:07:45 - Session terminated. ! 2024.07.02 17:08:16 - Deactivation of Network Lock ! 2024.07.02 17:23:24 - Activation of Network Lock - Windows Filtering Platform I 2024.07.02 17:23:31 - Session starting. I 2024.07.02 17:23:31 - Checking authorization ... . 2024.07.02 17:23:31 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.02 17:23:31 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 17:23:31 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 17:23:31 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:23:31 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 17:23:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 17:23:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 17:23:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 17:23:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:23:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:23:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:23:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:23:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 17:23:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 17:23:32 - OpenVPN > UDP link local: (not bound) . 2024.07.02 17:23:32 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 17:23:38 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=23178665 932af719 . 2024.07.02 17:23:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 17:23:38 - OpenVPN > VERIFY KU OK . 2024.07.02 17:23:38 - OpenVPN > Validating certificate extended key usage . 2024.07.02 17:23:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 17:23:38 - OpenVPN > VERIFY EKU OK . 2024.07.02 17:23:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 17:23:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 17:23:38 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 17:23:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.07.02 17:23:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 17:23:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 17:23:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 17:23:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 17:23:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 17:23:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:23:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:23:38 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 17:23:38 - OpenVPN > open_tun . 2024.07.02 17:23:38 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 17:23:38 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 17:23:38 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 17:23:38 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 17:23:38 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:23:38 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 17:23:38 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 17:23:38 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:23:38 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 17:23:38 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 17:23:38 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:23:38 - OpenVPN > Initialization Sequence Completed . 2024.07.02 17:23:38 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 17:23:38 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 17:23:38 - DNS leak protection with packet filtering enabled. . 2024.07.02 17:23:38 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 17:23:38 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:23:38 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 17:23:38 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:23:38 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:38 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:39 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:39 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:39 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:39 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:23:39 - Flushing DNS I 2024.07.02 17:23:39 - Checking route IPv4 . 2024.07.02 17:24:06 - Checking route (4° try) . 2024.07.02 17:24:31 - Checking route (5° try) E 2024.07.02 17:24:52 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.07.02 17:24:52 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:24:52 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:24:52 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:24:52 - Above log line repeated 32 times more ! 2024.07.02 17:24:52 - Disconnecting . 2024.07.02 17:24:52 - Sending soft termination signal . 2024.07.02 17:24:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 17:24:57 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 17:24:57 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 17:24:57 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:24:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 17:24:57 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 17:24:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 17:24:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:57 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:57 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:58 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:58 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:24:58 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:58 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:24:58 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 17:24:58 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:24:58 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:24:58 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:24:58 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:24:58 - DNS leak protection with packet filtering disabled. . 2024.07.02 17:24:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 17:24:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 17:24:58 - Connection terminated. I 2024.07.02 17:25:01 - Checking authorization ... I 2024.07.02 17:25:01 - Cancel requested. ! 2024.07.02 17:25:01 - Session terminated. ! 2024.07.02 17:25:03 - Deactivation of Network Lock . 2024.07.02 17:26:13 - Collect information about AirVPN completed ! 2024.07.02 17:27:57 - Activation of Network Lock - Windows Filtering Platform I 2024.07.02 17:27:58 - Session starting. I 2024.07.02 17:27:58 - Checking authorization ... . 2024.07.02 17:27:59 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.02 17:27:59 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.07.02 17:27:59 - Connecting to Mirfak (Germany, Frankfurt) . 2024.07.02 17:27:59 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:27:59 - Routes, add 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", already exists. . 2024.07.02 17:27:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.02 17:27:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.02 17:27:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.02 17:27:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:27:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:27:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.02 17:27:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.02 17:27:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.237:443 . 2024.07.02 17:27:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.02 17:27:59 - OpenVPN > UDP link local: (not bound) . 2024.07.02 17:27:59 - OpenVPN > UDP link remote: [AF_INET]141.98.102.237:443 . 2024.07.02 17:28:13 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.237:443, sid=9f73130a 4f1ae90b . 2024.07.02 17:28:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.07.02 17:28:13 - OpenVPN > VERIFY KU OK . 2024.07.02 17:28:13 - OpenVPN > Validating certificate extended key usage . 2024.07.02 17:28:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.07.02 17:28:13 - OpenVPN > VERIFY EKU OK . 2024.07.02 17:28:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirfak, emailAddress=info@airvpn.org . 2024.07.02 17:28:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.07.02 17:28:13 - OpenVPN > [Mirfak] Peer Connection Initiated with [AF_INET]141.98.102.237:443 . 2024.07.02 17:28:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.238.1,dhcp-option DNS6 fde6:7a:7d20:17ee::1,tun-ipv6,route-gateway 10.27.238.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ee::1076/64 fde6:7a:7d20:17ee::1,ifconfig 10.27.238.120 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.07.02 17:28:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.07.02 17:28:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.238.1' . 2024.07.02 17:28:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ee::1' . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.07.02 17:28:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.07.02 17:28:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.07.02 17:28:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:28:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.07.02 17:28:13 - OpenVPN > interactive service msg_channel=0 . 2024.07.02 17:28:13 - OpenVPN > open_tun . 2024.07.02 17:28:13 - OpenVPN > wintun device [Eddie] opened . 2024.07.02 17:28:13 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 4 static 10.27.238.120 255.255.255.0 . 2024.07.02 17:28:13 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 4 all . 2024.07.02 17:28:13 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 4 all . 2024.07.02 17:28:13 - OpenVPN > IPv4 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:28:13 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 4 fde6:7a:7d20:17ee::1076/128 store=active . 2024.07.02 17:28:13 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17ee::/64 -> fde6:7a:7d20:17ee::1076 metric 0) dev Eddie . 2024.07.02 17:28:13 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:28:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2024.07.02 17:28:13 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 4 all . 2024.07.02 17:28:13 - OpenVPN > IPv6 MTU set to 1500 on interface 4 using SetIpInterfaceEntry() . 2024.07.02 17:28:13 - OpenVPN > Initialization Sequence Completed . 2024.07.02 17:28:13 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.07.02 17:28:13 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.07.02 17:28:13 - DNS leak protection with packet filtering enabled. . 2024.07.02 17:28:13 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.27.238.1) . 2024.07.02 17:28:13 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:28:13 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.238.1) . 2024.07.02 17:28:13 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:17ee::1) . 2024.07.02 17:28:13 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Routes, add 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Routes, add 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:28:14 - Flushing DNS I 2024.07.02 17:28:14 - Checking route IPv4 . 2024.07.02 17:28:41 - Checking route (4° try) . 2024.07.02 17:29:06 - Checking route (5° try) E 2024.07.02 17:29:27 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.07.02 17:29:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:29:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:29:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.07.02 17:29:27 - Above log line repeated 36 times more ! 2024.07.02 17:29:27 - Disconnecting . 2024.07.02 17:29:27 - Sending soft termination signal . 2024.07.02 17:29:30 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.07.02 17:29:33 - OpenVPN > Closing TUN/TAP interface . 2024.07.02 17:29:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:17ee::/64) . 2024.07.02 17:29:33 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:17ee::/64 4 fe80::8 store=active . 2024.07.02 17:29:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 4 fde6:7a:7d20:17ee::1076 store=active . 2024.07.02 17:29:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 4 10.27.238.120 store=active . 2024.07.02 17:29:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.07.02 17:29:33 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)". . 2024.07.02 17:29:33 - Routes, delete 141.98.102.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete 2001:ac8:20:99:e23f:94b3:99d6:bd5e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.07.02 17:29:33 - Routes, delete 141.98.102.237/32 for interface "Ethernet (Realtek Gaming 2.5GbE Family Controller)", not exists. . 2024.07.02 17:29:33 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:29:33 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.07.02 17:29:33 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:29:33 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.07.02 17:29:33 - DNS leak protection with packet filtering disabled. . 2024.07.02 17:29:33 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.07.02 17:29:33 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.07.02 17:29:33 - Connection terminated. I 2024.07.02 17:29:34 - Cancel requested. ! 2024.07.02 17:29:35 - Session terminated. ! 2024.07.02 17:29:53 - Deactivation of Network Lock ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.2.1", "interface_index": 17, "metric": 0, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "192.168.2.0\/24", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "192.168.2.103\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "192.168.2.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}" }, { "destination": "::\/0", "gateway": "fe80::1", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "2003:c0:4703:2e91::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "2003:c0:4703:2e91:6922:b21e:81b0:3eb3\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "2003:c0:4703:2e91:8b69:d3cd:d352:9c56\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}" }, { "destination": "fe80::8cc5:e89e:eb33:7db8\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "fe80::8f93:7d12:5b85:476b\/128", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}" } ], "ipv4-default-gateway": "192.168.2.1", "ipv4-default-interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}", "ipv6-default-gateway": "fe80::1", "ipv6-default-interface": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}", "interfaces": [ { "friendly": "Ethernet", "id": "{EB56A96F-4318-4AE8-BF6C-B379B62B026B}", "name": "Ethernet", "description": "Realtek Gaming 2.5GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "202176047677", "bytes_sent": "4699196315", "support_ipv4": true, "support_ipv6": true, "ips": [ "2003:c0:4703:2e91:8b69:d3cd:d352:9c56", "2003:c0:4703:2e91:6922:b21e:81b0:3eb3", "fe80::8cc5:e89e:eb33:7db8", "192.168.2.103" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{8908FF7B-FDBE-42E0-BFD2-F02E131D15FF}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8f93:7d12:5b85:476b", "169.254.202.211" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{1E79FEDC-ADA0-11ED-9546-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : WIN-EL800MT8IST Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : speedport.ip Ethernet adapter Ethernet: Connection-specific DNS Suffix . : speedport.ip Description . . . . . . . . . . . : Realtek Gaming 2.5GbE Family Controller Physical Address. . . . . . . . . : 74-56-3C-3F-F0-F0 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2003:c0:4703:2e91:8b69:d3cd:d352:9c56(Preferred) Temporary IPv6 Address. . . . . . : 2003:c0:4703:2e91:6922:b21e:81b0:3eb3(Preferred) Link-local IPv6 Address . . . . . : fe80::8cc5:e89e:eb33:7db8%17(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.2.103(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Dienstag, 2. Juli 2024 15:56:13 Lease Expires . . . . . . . . . . : Dienstag, 23. Juli 2024 15:56:12 Default Gateway . . . . . . . . . : fe80::1%17 192.168.2.1 DHCP Server . . . . . . . . . . . : 192.168.2.1 DHCPv6 IAID . . . . . . . . . . . : 108287548 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-7F-4A-C3-74-56-3C-3F-F0-F0 DNS Servers . . . . . . . . . . . : fe80::1%17 192.168.2.1 NetBIOS over Tcpip. . . . . . . . : Enabled Connection-specific DNS Suffix Search List : speedport.ip Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : E8-48-B8-C8-20-00 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes