. 2024.07.04 19:48:08 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.07.04 19:48:08 - Command line arguments (1): path="home" . 2024.07.04 19:48:10 - Reading options from C:\Users\dwill\AppData\Local\Eddie\default.profile . 2024.07.04 19:48:12 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.07.04 19:48:12 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.07.04 19:48:12 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2024.07.04 19:48:12 - Recovery. Unexpected crash? E 2024.07.04 19:48:12 - Network interface no more available. I 2024.07.04 19:48:13 - Ready . 2024.07.04 19:48:14 - Collect information about AirVPN completed I 2024.07.04 19:48:31 - Session starting. I 2024.07.04 19:48:33 - Checking authorization ... F 2024.07.04 19:48:33 - Subscription required. I 2024.07.04 19:48:35 - Cancel requested. ! 2024.07.04 19:48:35 - Session terminated. I 2024.07.04 19:52:42 - Session starting. I 2024.07.04 19:52:43 - Checking authorization ... . 2024.07.04 19:52:45 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.04 19:52:46 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:52:46 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2024.07.04 19:52:46 - Routes, add 184.75.221.109/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:52:47 - Routes, add 184.75.221.109/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:52:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:52:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:52:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:52:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:52:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:52:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:52:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:52:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2024.07.04 19:52:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:52:47 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:52:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.109:443 . 2024.07.04 19:52:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=dc147a67 536c711b . 2024.07.04 19:52:47 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:52:47 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:52:47 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:52:47 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:52:47 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:52:47 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:52:47 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:52:47 - Disconnecting . 2024.07.04 19:52:47 - Sending soft termination signal . 2024.07.04 19:52:52 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:52:52 - Routes, delete 184.75.221.109/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:52:53 - Routes, delete 184.75.221.109/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:52:53 - Connection terminated. I 2024.07.04 19:52:56 - Checking authorization ... . 2024.07.04 19:52:56 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:52:56 - Connecting to Rotanev (Canada, Toronto, Ontario) . 2024.07.04 19:52:57 - Routes, add 104.254.90.189/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:52:57 - Routes, add 104.254.90.189/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:52:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:52:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:52:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:52:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:52:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:52:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:52:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:52:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443 . 2024.07.04 19:52:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:52:57 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:52:57 - OpenVPN > UDP link remote: [AF_INET]104.254.90.189:443 . 2024.07.04 19:52:57 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=1dcf391e ac1a89bf . 2024.07.04 19:52:57 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:52:57 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:52:57 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:52:57 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:52:57 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:52:57 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:52:57 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:52:57 - Disconnecting . 2024.07.04 19:52:57 - Sending soft termination signal . 2024.07.04 19:53:02 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:03 - Routes, delete 104.254.90.189/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:03 - Routes, delete 104.254.90.189/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:03 - Connection terminated. I 2024.07.04 19:53:06 - Checking authorization ... . 2024.07.04 19:53:07 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:53:07 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2024.07.04 19:53:07 - Routes, add 184.75.221.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:08 - Routes, add 184.75.221.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:53:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:53:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:53:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:53:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2024.07.04 19:53:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:53:08 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:53:08 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443 . 2024.07.04 19:53:08 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=204ae9ca 1842babc . 2024.07.04 19:53:08 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:53:08 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:53:08 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:53:08 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:53:08 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:53:08 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:53:08 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:53:08 - Disconnecting . 2024.07.04 19:53:08 - Sending soft termination signal . 2024.07.04 19:53:13 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:13 - Routes, delete 184.75.221.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:14 - Routes, delete 184.75.221.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:14 - Connection terminated. I 2024.07.04 19:53:17 - Checking authorization ... . 2024.07.04 19:53:17 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:53:17 - Connecting to Regulus (Canada, Toronto, Ontario) . 2024.07.04 19:53:18 - Routes, add 184.75.221.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:18 - Routes, add 184.75.221.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:53:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:53:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:53:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:53:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2024.07.04 19:53:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:53:18 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:53:18 - OpenVPN > UDP link remote: [AF_INET]184.75.221.37:443 . 2024.07.04 19:53:18 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=ca889363 c6c7a8f3 . 2024.07.04 19:53:19 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:53:19 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:53:19 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:53:19 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:53:19 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:53:19 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:53:19 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:53:19 - Disconnecting . 2024.07.04 19:53:19 - Sending soft termination signal . 2024.07.04 19:53:23 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:24 - Routes, delete 184.75.221.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:24 - Routes, delete 184.75.221.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:24 - Connection terminated. I 2024.07.04 19:53:27 - Checking authorization ... . 2024.07.04 19:53:28 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:53:28 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2024.07.04 19:53:29 - Routes, add 184.75.221.181/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:29 - Routes, add 184.75.221.181/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:53:29 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:53:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:53:29 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:53:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.181:443 . 2024.07.04 19:53:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:53:29 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:53:29 - OpenVPN > UDP link remote: [AF_INET]184.75.221.181:443 . 2024.07.04 19:53:29 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.181:443, sid=bcf08427 f6760af9 . 2024.07.04 19:53:29 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:53:29 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:53:29 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:53:29 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:53:29 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:53:29 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:53:29 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:53:29 - Disconnecting . 2024.07.04 19:53:29 - Sending soft termination signal . 2024.07.04 19:53:34 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:35 - Routes, delete 184.75.221.181/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:35 - Routes, delete 184.75.221.181/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:35 - Connection terminated. I 2024.07.04 19:53:38 - Checking authorization ... . 2024.07.04 19:53:39 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:53:39 - Connecting to Enif (Canada, Toronto, Ontario) . 2024.07.04 19:53:39 - Routes, add 104.254.90.245/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:40 - Routes, add 104.254.90.245/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:53:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:53:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:53:40 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:53:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2024.07.04 19:53:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:53:40 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:53:40 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2024.07.04 19:53:40 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=38821f00 57d4405a . 2024.07.04 19:53:40 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:53:40 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:53:40 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:53:40 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:53:40 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:53:40 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:53:40 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:53:40 - Disconnecting . 2024.07.04 19:53:40 - Sending soft termination signal . 2024.07.04 19:53:45 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:45 - Routes, delete 104.254.90.245/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:45 - Routes, delete 104.254.90.245/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:45 - Connection terminated. I 2024.07.04 19:53:48 - Checking authorization ... . 2024.07.04 19:53:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:53:49 - Connecting to Wurren (Canada, Toronto, Ontario) . 2024.07.04 19:53:50 - Routes, add 199.189.27.125/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:50 - Routes, add 199.189.27.125/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:53:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:53:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:53:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:53:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:53:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:53:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.189.27.125:443 . 2024.07.04 19:53:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:53:50 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:53:50 - OpenVPN > UDP link remote: [AF_INET]199.189.27.125:443 . 2024.07.04 19:53:50 - OpenVPN > TLS: Initial packet from [AF_INET]199.189.27.125:443, sid=8525960b b2e75078 . 2024.07.04 19:53:50 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:53:50 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:53:50 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:53:50 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:53:50 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:53:50 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:53:50 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:53:50 - Disconnecting . 2024.07.04 19:53:50 - Sending soft termination signal . 2024.07.04 19:53:55 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:53:56 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:53:56 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:53:56 - Connection terminated. I 2024.07.04 19:53:59 - Checking authorization ... . 2024.07.04 19:54:00 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:00 - Connecting to Arkab (Canada, Toronto, Ontario) . 2024.07.04 19:54:00 - Routes, add 184.75.221.213/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:00 - Routes, add 184.75.221.213/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:01 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:01 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443 . 2024.07.04 19:54:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:01 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:01 - OpenVPN > UDP link remote: [AF_INET]184.75.221.213:443 . 2024.07.04 19:54:01 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=fdda39b4 bbc884c0 . 2024.07.04 19:54:01 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:01 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:01 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:01 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:01 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:01 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:01 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:01 - Disconnecting . 2024.07.04 19:54:01 - Sending soft termination signal . 2024.07.04 19:54:06 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:06 - Routes, delete 184.75.221.213/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:06 - Routes, delete 184.75.221.213/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:06 - Connection terminated. I 2024.07.04 19:54:10 - Checking authorization ... . 2024.07.04 19:54:10 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:10 - Connecting to Avior (Canada, Toronto, Ontario) . 2024.07.04 19:54:11 - Routes, add 184.75.223.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:11 - Routes, add 184.75.223.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2024.07.04 19:54:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:11 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:11 - OpenVPN > UDP link remote: [AF_INET]184.75.223.237:443 . 2024.07.04 19:54:11 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=bc11f209 b166c8cd . 2024.07.04 19:54:11 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:11 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:11 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:11 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:11 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:11 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:11 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:11 - Disconnecting . 2024.07.04 19:54:11 - Sending soft termination signal . 2024.07.04 19:54:16 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:17 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:17 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:17 - Connection terminated. I 2024.07.04 19:54:20 - Checking authorization ... . 2024.07.04 19:54:21 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:21 - Connecting to Sargas (Canada, Toronto, Ontario) . 2024.07.04 19:54:21 - Routes, add 184.75.223.197/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:22 - Routes, add 184.75.223.197/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2024.07.04 19:54:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:22 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:22 - OpenVPN > UDP link remote: [AF_INET]184.75.223.197:443 . 2024.07.04 19:54:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=da3cc620 461c7fd0 . 2024.07.04 19:54:22 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:22 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:22 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:22 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:22 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:22 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:22 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:22 - Disconnecting . 2024.07.04 19:54:22 - Sending soft termination signal . 2024.07.04 19:54:27 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:27 - Routes, delete 184.75.223.197/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:28 - Routes, delete 184.75.223.197/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:28 - Connection terminated. I 2024.07.04 19:54:31 - Checking authorization ... . 2024.07.04 19:54:31 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:31 - Connecting to Saiph (Canada, Toronto, Ontario) . 2024.07.04 19:54:32 - Routes, add 184.75.223.229/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:32 - Routes, add 184.75.223.229/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443 . 2024.07.04 19:54:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:32 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:32 - OpenVPN > UDP link remote: [AF_INET]184.75.223.229:443 . 2024.07.04 19:54:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=615673f2 7a1cc0a1 . 2024.07.04 19:54:32 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:32 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:32 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:32 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:32 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:32 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:32 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:32 - Disconnecting . 2024.07.04 19:54:32 - Sending soft termination signal . 2024.07.04 19:54:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:38 - Routes, delete 184.75.223.229/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:38 - Routes, delete 184.75.223.229/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:38 - Connection terminated. I 2024.07.04 19:54:41 - Checking authorization ... . 2024.07.04 19:54:42 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:42 - Connecting to Lesath (Canada, Toronto, Ontario) . 2024.07.04 19:54:43 - Routes, add 184.75.221.5/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:43 - Routes, add 184.75.221.5/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2024.07.04 19:54:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:43 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:43 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443 . 2024.07.04 19:54:43 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=fb2b733a 6bab9cf1 . 2024.07.04 19:54:43 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:43 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:43 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:43 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:43 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:43 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:43 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:43 - Disconnecting . 2024.07.04 19:54:43 - Sending soft termination signal . 2024.07.04 19:54:48 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:48 - Routes, delete 184.75.221.5/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:49 - Routes, delete 184.75.221.5/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:49 - Connection terminated. I 2024.07.04 19:54:52 - Checking authorization ... . 2024.07.04 19:54:52 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:54:52 - Connecting to Alya (Canada, Toronto, Ontario) . 2024.07.04 19:54:53 - Routes, add 184.75.221.173/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:53 - Routes, add 184.75.221.173/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:54:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:54:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:54:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:54:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:54:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:54:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443 . 2024.07.04 19:54:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:54:53 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:54:53 - OpenVPN > UDP link remote: [AF_INET]184.75.221.173:443 . 2024.07.04 19:54:53 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=d1197557 bb9818c9 . 2024.07.04 19:54:54 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:54:54 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:54:54 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:54:54 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:54:54 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:54:54 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:54:54 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:54:54 - Disconnecting . 2024.07.04 19:54:54 - Sending soft termination signal . 2024.07.04 19:54:58 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:54:59 - Routes, delete 184.75.221.173/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:54:59 - Routes, delete 184.75.221.173/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:54:59 - Connection terminated. I 2024.07.04 19:55:02 - Checking authorization ... . 2024.07.04 19:55:03 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:55:03 - Connecting to Tyl (Canada, Toronto, Ontario) . 2024.07.04 19:55:04 - Routes, add 184.75.223.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:04 - Routes, add 184.75.223.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:55:04 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:55:04 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:55:04 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:55:04 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:04 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:04 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:04 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443 . 2024.07.04 19:55:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:55:04 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:55:04 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443 . 2024.07.04 19:55:04 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=0aa2b361 9faccca7 . 2024.07.04 19:55:04 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:55:04 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:55:04 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:55:04 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:55:04 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:55:04 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:55:04 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:55:04 - Disconnecting . 2024.07.04 19:55:04 - Sending soft termination signal . 2024.07.04 19:55:09 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:55:10 - Routes, delete 184.75.223.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:10 - Routes, delete 184.75.223.205/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:55:10 - Connection terminated. I 2024.07.04 19:55:13 - Checking authorization ... . 2024.07.04 19:55:14 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:55:14 - Connecting to Chort (Canada, Toronto, Ontario) . 2024.07.04 19:55:14 - Routes, add 104.254.90.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:14 - Routes, add 104.254.90.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:55:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:55:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:55:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:55:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2024.07.04 19:55:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:55:15 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:55:15 - OpenVPN > UDP link remote: [AF_INET]104.254.90.237:443 . 2024.07.04 19:55:15 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=185506ef 3644446b . 2024.07.04 19:55:15 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:55:15 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:55:15 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:55:15 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:55:15 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:55:15 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:55:15 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:55:15 - Disconnecting . 2024.07.04 19:55:15 - Sending soft termination signal . 2024.07.04 19:55:20 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:55:20 - Routes, delete 104.254.90.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:20 - Routes, delete 104.254.90.237/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:55:20 - Connection terminated. I 2024.07.04 19:55:23 - Checking authorization ... . 2024.07.04 19:55:24 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:55:24 - Connecting to Achird (Switzerland, Zurich) . 2024.07.04 19:55:25 - Routes, add 185.156.175.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:25 - Routes, add 185.156.175.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:55:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:55:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:55:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:55:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.37:443 . 2024.07.04 19:55:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:55:25 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:55:25 - OpenVPN > UDP link remote: [AF_INET]185.156.175.37:443 . 2024.07.04 19:55:25 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.37:443, sid=7a6ed886 54372b00 . 2024.07.04 19:55:25 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:55:25 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:55:25 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:55:25 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:55:25 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:55:25 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:55:25 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:55:25 - Disconnecting . 2024.07.04 19:55:25 - Sending soft termination signal . 2024.07.04 19:55:30 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:55:31 - Routes, delete 185.156.175.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:31 - Routes, delete 185.156.175.37/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:55:31 - Connection terminated. I 2024.07.04 19:55:34 - Checking authorization ... . 2024.07.04 19:55:35 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:55:35 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2024.07.04 19:55:35 - Routes, add 184.75.221.61/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:36 - Routes, add 184.75.221.61/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:55:36 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:55:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:55:36 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:55:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443 . 2024.07.04 19:55:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:55:36 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:55:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.61:443 . 2024.07.04 19:55:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=5ce5f477 6fdc395b . 2024.07.04 19:55:36 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:55:36 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:55:36 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:55:36 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:55:36 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:55:36 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:55:36 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:55:36 - Disconnecting . 2024.07.04 19:55:36 - Sending soft termination signal . 2024.07.04 19:55:41 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:55:41 - Routes, delete 184.75.221.61/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:42 - Routes, delete 184.75.221.61/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:55:42 - Connection terminated. I 2024.07.04 19:55:45 - Checking authorization ... . 2024.07.04 19:55:45 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.04 19:55:45 - Connecting to Gorgonea (Canada, Toronto, Ontario) . 2024.07.04 19:55:46 - Routes, add 104.254.90.253/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:46 - Routes, add 104.254.90.253/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.04 19:55:46 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.04 19:55:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.04 19:55:46 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.04 19:55:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.04 19:55:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.04 19:55:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443 . 2024.07.04 19:55:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.04 19:55:46 - OpenVPN > UDP link local: (not bound) . 2024.07.04 19:55:46 - OpenVPN > UDP link remote: [AF_INET]104.254.90.253:443 . 2024.07.04 19:55:46 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=14954acf a0c54538 . 2024.07.04 19:55:47 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.04 19:55:47 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.04 19:55:47 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.04 19:55:47 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.04 19:55:47 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.04 19:55:47 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.04 19:55:47 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.04 19:55:47 - Disconnecting . 2024.07.04 19:55:47 - Sending soft termination signal . 2024.07.04 19:55:52 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.04 19:55:52 - Routes, delete 104.254.90.253/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.04 19:55:52 - Routes, delete 104.254.90.253/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.04 19:55:52 - Connection terminated. I 2024.07.04 19:55:54 - Cancel requested. ! 2024.07.04 19:55:55 - Session terminated. . 2024.07.04 20:18:21 - Collect information about AirVPN completed . 2024.07.04 23:25:03 - Collect information about AirVPN completed . 2024.07.05 12:49:00 - Collect information about AirVPN completed I 2024.07.05 12:49:32 - Session starting. I 2024.07.05 12:49:34 - Checking authorization ... . 2024.07.05 12:49:35 - Added new network interface "Eddie", Wintun version 0.12 . 2024.07.05 12:49:35 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.07.05 12:49:35 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2024.07.05 12:49:36 - Routes, add 184.75.223.221/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.05 12:49:37 - Routes, add 184.75.223.221/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", already exists. . 2024.07.05 12:49:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.07.05 12:49:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.07.05 12:49:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.07.05 12:49:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.05 12:49:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.05 12:49:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.07.05 12:49:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.07.05 12:49:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2024.07.05 12:49:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.07.05 12:49:37 - OpenVPN > UDP link local: (not bound) . 2024.07.05 12:49:37 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2024.07.05 12:49:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=06017dc4 0585c4c0 . 2024.07.05 12:49:37 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.07.05 12:49:37 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed . 2024.07.05 12:49:37 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error . 2024.07.05 12:49:37 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error . 2024.07.05 12:49:37 - OpenVPN > TLS Error: TLS handshake failed . 2024.07.05 12:49:37 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2024.07.05 12:49:37 - OpenVPN > Restart pause, 5 second(s) ! 2024.07.05 12:49:37 - Disconnecting . 2024.07.05 12:49:37 - Sending soft termination signal . 2024.07.05 12:49:42 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2024.07.05 12:49:43 - Routes, delete 184.75.223.221/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)". . 2024.07.05 12:49:43 - Routes, delete 184.75.223.221/32 for interface "Wi-Fi (Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz)", not exists. . 2024.07.05 12:49:43 - Connection terminated. I 2024.07.05 12:49:45 - Cancel requested. ! 2024.07.05 12:49:46 - Session terminated.