. 2024.09.17 01:04:09 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2024.09.17 01:04:14 - Reading options from C:\Users\Chris and Smough\AppData\Local\Eddie\default.profile . 2024.09.17 01:04:17 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.09.17 01:04:17 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.09.17 01:04:17 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.09.17 01:04:18 - Ready . 2024.09.17 01:04:19 - Collect information about AirVPN completed I 2024.09.17 01:04:20 - Session starting. . 2024.09.17 01:04:20 - Waiting for latency tests (2 to go) . 2024.09.17 01:04:20 - Collect information about AirVPN completed I 2024.09.17 01:04:23 - Checking authorization ... . 2024.09.17 01:04:24 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:04:24 - Connecting to Gorgonea (Canada, Toronto, Ontario) . 2024.09.17 01:04:24 - Routes, add 104.254.90.253/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:24 - Routes, add 104.254.90.253/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:04:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:04:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:04:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:04:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443 . 2024.09.17 01:04:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:04:24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.253:443 [nonblock] . 2024.09.17 01:04:24 - OpenVPN > TCP connection established with [AF_INET]104.254.90.253:443 . 2024.09.17 01:04:24 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:04:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.253:443 . 2024.09.17 01:04:24 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=c3721627 535c8810 . 2024.09.17 01:04:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:04:25 - OpenVPN > VERIFY KU OK . 2024.09.17 01:04:25 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:04:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:04:25 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:04:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gorgonea, emailAddress=info@airvpn.org . 2024.09.17 01:04:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:04:25 - OpenVPN > [Gorgonea] Peer Connection Initiated with [AF_INET]104.254.90.253:443 . 2024.09.17 01:04:26 - OpenVPN > SENT CONTROL [Gorgonea]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:04:26 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:04:26 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:04:26 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:04:26 - Disconnecting . 2024.09.17 01:04:27 - Routes, delete 104.254.90.253/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:27 - Routes, delete 104.254.90.253/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:04:27 - Connection terminated. I 2024.09.17 01:04:30 - Checking authorization ... . 2024.09.17 01:04:30 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:04:30 - Connecting to Alya (Canada, Toronto, Ontario) . 2024.09.17 01:04:31 - Routes, add 184.75.221.173/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:31 - Routes, add 184.75.221.173/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:04:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:04:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:04:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:04:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443 . 2024.09.17 01:04:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:04:31 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.173:443 [nonblock] . 2024.09.17 01:04:31 - OpenVPN > TCP connection established with [AF_INET]184.75.221.173:443 . 2024.09.17 01:04:31 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:04:31 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.173:443 . 2024.09.17 01:04:31 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=e0cb0eaf a5ad7441 . 2024.09.17 01:04:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:04:31 - OpenVPN > VERIFY KU OK . 2024.09.17 01:04:31 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:04:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:04:31 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:04:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org . 2024.09.17 01:04:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:04:31 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443 . 2024.09.17 01:04:32 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:04:32 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:04:32 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:04:32 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:04:32 - Disconnecting . 2024.09.17 01:04:33 - Routes, delete 184.75.221.173/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:33 - Routes, delete 184.75.221.173/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:04:33 - Connection terminated. I 2024.09.17 01:04:36 - Checking authorization ... . 2024.09.17 01:04:36 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:04:36 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.09.17 01:04:36 - Routes, add 184.75.208.244/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:37 - Routes, add 184.75.208.244/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:04:37 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:04:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:04:37 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:04:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.09.17 01:04:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:04:37 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.208.244:443 [nonblock] . 2024.09.17 01:04:37 - OpenVPN > TCP connection established with [AF_INET]184.75.208.244:443 . 2024.09.17 01:04:37 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:04:37 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.208.244:443 . 2024.09.17 01:04:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=35d784c6 62e0894a . 2024.09.17 01:04:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:04:37 - OpenVPN > VERIFY KU OK . 2024.09.17 01:04:37 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:04:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:04:37 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:04:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.09.17 01:04:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:04:37 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.09.17 01:04:38 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:04:39 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:04:39 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:04:39 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:04:39 - Disconnecting . 2024.09.17 01:04:39 - Routes, delete 184.75.208.244/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:39 - Routes, delete 184.75.208.244/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:04:39 - Connection terminated. I 2024.09.17 01:04:42 - Checking authorization ... . 2024.09.17 01:04:43 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:04:43 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2024.09.17 01:04:43 - Routes, add 184.75.221.205/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:43 - Routes, add 184.75.221.205/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:04:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:04:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:04:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:04:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2024.09.17 01:04:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:04:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.205:443 [nonblock] . 2024.09.17 01:04:43 - OpenVPN > TCP connection established with [AF_INET]184.75.221.205:443 . 2024.09.17 01:04:43 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:04:43 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.205:443 . 2024.09.17 01:04:43 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=05a02be9 5adf9c36 . 2024.09.17 01:04:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:04:43 - OpenVPN > VERIFY KU OK . 2024.09.17 01:04:43 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:04:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:04:43 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:04:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2024.09.17 01:04:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:04:43 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 . 2024.09.17 01:04:44 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:04:45 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:04:45 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:04:45 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:04:45 - Disconnecting . 2024.09.17 01:04:45 - Routes, delete 184.75.221.205/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:45 - Routes, delete 184.75.221.205/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:04:45 - Connection terminated. I 2024.09.17 01:04:48 - Checking authorization ... . 2024.09.17 01:04:49 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:04:49 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2024.09.17 01:04:49 - Routes, add 184.75.223.221/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:49 - Routes, add 184.75.223.221/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:04:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:04:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:04:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:04:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:04:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:04:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2024.09.17 01:04:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:04:49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.221:443 [nonblock] . 2024.09.17 01:04:49 - OpenVPN > TCP connection established with [AF_INET]184.75.223.221:443 . 2024.09.17 01:04:49 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:04:49 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.221:443 . 2024.09.17 01:04:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=22f25bfd 305e63d2 . 2024.09.17 01:04:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:04:49 - OpenVPN > VERIFY KU OK . 2024.09.17 01:04:49 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:04:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:04:49 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:04:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2024.09.17 01:04:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:04:49 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2024.09.17 01:04:51 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:04:51 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:04:51 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:04:51 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:04:51 - Disconnecting . 2024.09.17 01:04:51 - Routes, delete 184.75.223.221/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:04:51 - Routes, delete 184.75.223.221/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:04:51 - Connection terminated. I 2024.09.17 01:04:54 - Cancel requested. ! 2024.09.17 01:04:54 - Session terminated. ! 2024.09.17 01:13:38 - Activation of Network Lock - Windows Filtering Platform I 2024.09.17 01:13:40 - Session starting. I 2024.09.17 01:13:41 - Checking authorization ... . 2024.09.17 01:13:41 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:13:41 - Connecting to Saiph (Canada, Toronto, Ontario) . 2024.09.17 01:13:41 - Routes, add 184.75.223.229/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:13:41 - Routes, add 184.75.223.229/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:13:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:13:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:13:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:13:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:13:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:13:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:13:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:13:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443 . 2024.09.17 01:13:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:13:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.229:443 [nonblock] . 2024.09.17 01:13:42 - OpenVPN > TCP connection established with [AF_INET]184.75.223.229:443 . 2024.09.17 01:13:42 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.09.17 01:13:42 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.229:443 . 2024.09.17 01:13:42 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=c49da8a9 d442a960 . 2024.09.17 01:13:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:13:42 - OpenVPN > VERIFY KU OK . 2024.09.17 01:13:42 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:13:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:13:42 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:13:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2024.09.17 01:13:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:13:42 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443 . 2024.09.17 01:13:43 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:13:43 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:13:43 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:13:43 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2024.09.17 01:13:43 - Disconnecting . 2024.09.17 01:13:43 - Routes, delete 184.75.223.229/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:13:43 - Routes, delete 184.75.223.229/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:13:43 - Connection terminated. I 2024.09.17 01:13:45 - Cancel requested. ! 2024.09.17 01:13:45 - Session terminated. ! 2024.09.17 01:16:25 - Deactivation of Network Lock I 2024.09.17 01:19:01 - Session starting. I 2024.09.17 01:19:02 - Checking authorization ... . 2024.09.17 01:19:03 - Using WinTun network interface "Local Area Connection (VeePN-TAP)" ! 2024.09.17 01:19:03 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2024.09.17 01:19:03 - Routes, add 184.75.221.109/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:19:03 - Routes, add 184.75.221.109/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", already exists. . 2024.09.17 01:19:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.09.17 01:19:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.09.17 01:19:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.09.17 01:19:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:19:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:19:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.09.17 01:19:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.09.17 01:19:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2024.09.17 01:19:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.09.17 01:19:03 - OpenVPN > UDP link local: (not bound) . 2024.09.17 01:19:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.109:443 . 2024.09.17 01:19:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=ad871182 9268267d . 2024.09.17 01:19:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.09.17 01:19:03 - OpenVPN > VERIFY KU OK . 2024.09.17 01:19:03 - OpenVPN > Validating certificate extended key usage . 2024.09.17 01:19:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.09.17 01:19:03 - OpenVPN > VERIFY EKU OK . 2024.09.17 01:19:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2024.09.17 01:19:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.09.17 01:19:03 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 . 2024.09.17 01:19:05 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1) . 2024.09.17 01:19:05 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.09.17 01:19:05 - Authorization failed. Look at the client area to discover the reason. . 2024.09.17 01:19:05 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.09.17 01:19:05 - Disconnecting . 2024.09.17 01:19:05 - Sending soft termination signal . 2024.09.17 01:19:08 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.09.17 01:19:08 - Routes, delete 184.75.221.109/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)". . 2024.09.17 01:19:08 - Routes, delete 184.75.221.109/32 for interface "Ethernet 5 (Intel(R) Ethernet Connection (2) I219-V #2)", not exists. . 2024.09.17 01:19:08 - Connection terminated. I 2024.09.17 01:19:10 - Cancel requested. ! 2024.09.17 01:19:10 - Session terminated.