Eddie System/Environment Report - 11/2/2024 - 5:13 PM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.22631.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Tommy\AppData\Local\Eddie\default.profile Data path: C:\Users\Tommy\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 192.168.1.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 98 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True ---------------------------- Logs: . 2024.11.02 13:05:30 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.11.02 13:05:30 - Command line arguments (1): path="home" . 2024.11.02 13:05:32 - Reading options from C:\Users\Tommy\AppData\Local\Eddie\default.profile . 2024.11.02 13:05:33 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.11.02 13:05:33 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.11.02 13:05:33 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.11.02 13:05:34 - Ready . 2024.11.02 13:05:36 - Collect information about AirVPN completed I 2024.11.02 13:05:44 - Session starting. I 2024.11.02 13:05:45 - Checking authorization ... . 2024.11.02 13:05:46 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:05:46 - Connecting to Muliphein (United States of America, New York City) . 2024.11.02 13:05:47 - Routes, add 198.44.136.238/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:05:47 - Routes, add 198.44.136.238/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:05:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:05:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:05:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:05:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.238:443 . 2024.11.02 13:05:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:05:47 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:05:47 - OpenVPN > UDP link remote: [AF_INET]198.44.136.238:443 . 2024.11.02 13:05:47 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.238:443, sid=120dcdc3 822f290a . 2024.11.02 13:05:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:05:47 - OpenVPN > VERIFY KU OK . 2024.11.02 13:05:47 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:05:47 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muliphein, emailAddress=info@airvpn.org . 2024.11.02 13:05:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:05:47 - OpenVPN > [Muliphein] Peer Connection Initiated with [AF_INET]198.44.136.238:443 . 2024.11.02 13:05:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.74.1,dhcp-option DNS6 fde6:7a:7d20:124a::1,tun-ipv6,route-gateway 10.22.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:124a::106a/64 fde6:7a:7d20:124a::1,ifconfig 10.22.74.108 255.255.255.0,peer-id 13,cipher AES-256-GCM' . 2024.11.02 13:05:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:05:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.74.1' . 2024.11.02 13:05:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:124a::1' . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:05:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:05:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:05:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:05:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:05:48 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:05:48 - OpenVPN > open_tun . 2024.11.02 13:05:48 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:05:48 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:05:48 - Disconnecting . 2024.11.02 13:05:48 - Routes, delete 198.44.136.238/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:05:48 - Routes, delete 198.44.136.238/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:05:48 - Connection terminated. I 2024.11.02 13:05:51 - Checking authorization ... . 2024.11.02 13:05:52 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:05:52 - Connecting to Paikauhale (United States of America, New York City) . 2024.11.02 13:05:53 - Routes, add 198.44.136.254/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:05:53 - Routes, add 198.44.136.254/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:05:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:05:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:05:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:05:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.254:443 . 2024.11.02 13:05:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:05:53 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:05:53 - OpenVPN > UDP link remote: [AF_INET]198.44.136.254:443 . 2024.11.02 13:05:53 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.254:443, sid=577c7754 7d7e168b . 2024.11.02 13:05:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:05:53 - OpenVPN > VERIFY KU OK . 2024.11.02 13:05:53 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:05:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:05:53 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:05:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Paikauhale, emailAddress=info@airvpn.org . 2024.11.02 13:05:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:05:53 - OpenVPN > [Paikauhale] Peer Connection Initiated with [AF_INET]198.44.136.254:443 . 2024.11.02 13:05:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.170.1,dhcp-option DNS6 fde6:7a:7d20:12aa::1,tun-ipv6,route-gateway 10.22.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12aa::1064/64 fde6:7a:7d20:12aa::1,ifconfig 10.22.170.102 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.11.02 13:05:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:05:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.170.1' . 2024.11.02 13:05:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12aa::1' . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:05:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:05:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:05:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:05:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:05:54 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:05:54 - OpenVPN > open_tun . 2024.11.02 13:05:54 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:05:54 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:05:54 - Disconnecting . 2024.11.02 13:05:54 - Routes, delete 198.44.136.254/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:05:54 - Routes, delete 198.44.136.254/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:05:54 - Connection terminated. I 2024.11.02 13:05:58 - Checking authorization ... . 2024.11.02 13:05:58 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:05:58 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.02 13:05:59 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:05:59 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:05:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:05:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:05:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:05:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:05:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:05:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.02 13:05:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:05:59 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:05:59 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.02 13:05:59 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=1e94991a 404b4111 . 2024.11.02 13:05:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:05:59 - OpenVPN > VERIFY KU OK . 2024.11.02 13:05:59 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:05:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:05:59 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:05:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.02 13:05:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:05:59 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.02 13:06:00 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.74.1,dhcp-option DNS6 fde6:7a:7d20:1b4a::1,tun-ipv6,route-gateway 10.31.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b4a::10c9/64 fde6:7a:7d20:1b4a::1,ifconfig 10.31.74.203 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.11.02 13:06:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.74.1' . 2024.11.02 13:06:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b4a::1' . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:00 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:00 - OpenVPN > open_tun . 2024.11.02 13:06:00 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:00 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:00 - Disconnecting . 2024.11.02 13:06:00 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:01 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:01 - Connection terminated. I 2024.11.02 13:06:04 - Checking authorization ... . 2024.11.02 13:06:05 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:05 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2024.11.02 13:06:05 - Routes, add 184.75.223.221/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:05 - Routes, add 184.75.223.221/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2024.11.02 13:06:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:06 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:06 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2024.11.02 13:06:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=0f5d135f 7d6218a8 . 2024.11.02 13:06:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:06 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:06 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:06 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2024.11.02 13:06:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:06 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2024.11.02 13:06:06 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.10.1,dhcp-option DNS6 fde6:7a:7d20:140a::1,tun-ipv6,route-gateway 10.24.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:140a::1010/64 fde6:7a:7d20:140a::1,ifconfig 10.24.10.18 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.11.02 13:06:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.10.1' . 2024.11.02 13:06:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:140a::1' . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:06 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:06 - OpenVPN > open_tun . 2024.11.02 13:06:06 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:06 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:06 - Disconnecting . 2024.11.02 13:06:07 - Routes, delete 184.75.223.221/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:07 - Routes, delete 184.75.223.221/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:07 - Connection terminated. I 2024.11.02 13:06:10 - Checking authorization ... . 2024.11.02 13:06:11 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:11 - Connecting to Lesath (Canada, Toronto, Ontario) . 2024.11.02 13:06:11 - Routes, add 184.75.221.5/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:12 - Routes, add 184.75.221.5/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2024.11.02 13:06:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:12 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:12 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443 . 2024.11.02 13:06:12 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=f8745436 1b23dabb . 2024.11.02 13:06:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:12 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:12 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:12 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2024.11.02 13:06:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:12 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2024.11.02 13:06:12 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.234.1,dhcp-option DNS6 fde6:7a:7d20:10ea::1,tun-ipv6,route-gateway 10.20.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10ea::1045/64 fde6:7a:7d20:10ea::1,ifconfig 10.20.234.71 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.11.02 13:06:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.234.1' . 2024.11.02 13:06:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:10ea::1' . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:12 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:12 - OpenVPN > open_tun . 2024.11.02 13:06:12 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:12 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:12 - Disconnecting . 2024.11.02 13:06:13 - Routes, delete 184.75.221.5/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:13 - Routes, delete 184.75.221.5/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:13 - Connection terminated. I 2024.11.02 13:06:16 - Checking authorization ... . 2024.11.02 13:06:17 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:17 - Connecting to Terebellum (United States of America, New York City) . 2024.11.02 13:06:17 - Routes, add 198.44.136.30/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:18 - Routes, add 198.44.136.30/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.30:443 . 2024.11.02 13:06:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:18 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:18 - OpenVPN > UDP link remote: [AF_INET]198.44.136.30:443 . 2024.11.02 13:06:18 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.30:443, sid=9ac7a289 a3d2dd4a . 2024.11.02 13:06:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:18 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:18 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:18 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Terebellum, emailAddress=info@airvpn.org . 2024.11.02 13:06:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:18 - OpenVPN > [Terebellum] Peer Connection Initiated with [AF_INET]198.44.136.30:443 . 2024.11.02 13:06:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.138.1,dhcp-option DNS6 fde6:7a:7d20:1c8a::1,tun-ipv6,route-gateway 10.32.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c8a::1060/64 fde6:7a:7d20:1c8a::1,ifconfig 10.32.138.98 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.11.02 13:06:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.138.1' . 2024.11.02 13:06:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c8a::1' . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:18 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:18 - OpenVPN > open_tun . 2024.11.02 13:06:18 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:18 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:18 - Disconnecting . 2024.11.02 13:06:19 - Routes, delete 198.44.136.30/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:19 - Routes, delete 198.44.136.30/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:19 - Connection terminated. I 2024.11.02 13:06:22 - Checking authorization ... . 2024.11.02 13:06:23 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:23 - Connecting to Lacerta (Canada, Montreal) . 2024.11.02 13:06:24 - Routes, add 87.101.92.173/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:24 - Routes, add 87.101.92.173/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]87.101.92.173:443 . 2024.11.02 13:06:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:24 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:24 - OpenVPN > UDP link remote: [AF_INET]87.101.92.173:443 . 2024.11.02 13:06:27 - OpenVPN > TLS: Initial packet from [AF_INET]87.101.92.173:443, sid=7eac7246 4ce74e97 . 2024.11.02 13:06:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:27 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:27 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:27 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacerta, emailAddress=info@airvpn.org . 2024.11.02 13:06:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:27 - OpenVPN > [Lacerta] Peer Connection Initiated with [AF_INET]87.101.92.173:443 . 2024.11.02 13:06:27 - OpenVPN > SENT CONTROL [Lacerta]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.10.1,dhcp-option DNS6 fde6:7a:7d20:70a::1,tun-ipv6,route-gateway 10.11.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:70a::10b5/64 fde6:7a:7d20:70a::1,ifconfig 10.11.10.183 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.11.02 13:06:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.10.1' . 2024.11.02 13:06:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:70a::1' . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:27 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:27 - OpenVPN > open_tun . 2024.11.02 13:06:27 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:27 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:27 - Disconnecting . 2024.11.02 13:06:28 - Routes, delete 87.101.92.173/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:28 - Routes, delete 87.101.92.173/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:28 - Connection terminated. I 2024.11.02 13:06:31 - Checking authorization ... . 2024.11.02 13:06:32 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:32 - Connecting to Khambalia (United States of America, Chicago, Illinois) . 2024.11.02 13:06:32 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:32 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.86:443 . 2024.11.02 13:06:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:32 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:32 - OpenVPN > UDP link remote: [AF_INET]198.44.133.86:443 . 2024.11.02 13:06:33 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.86:443, sid=1f175e4a 26ea4b93 . 2024.11.02 13:06:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:33 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:33 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:33 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Khambalia, emailAddress=info@airvpn.org . 2024.11.02 13:06:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:33 - OpenVPN > [Khambalia] Peer Connection Initiated with [AF_INET]198.44.133.86:443 . 2024.11.02 13:06:33 - OpenVPN > SENT CONTROL [Khambalia]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1050/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.82 255.255.255.0,peer-id 11,cipher AES-256-GCM' . 2024.11.02 13:06:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2024.11.02 13:06:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:33 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:33 - OpenVPN > open_tun . 2024.11.02 13:06:33 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:33 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:33 - Disconnecting . 2024.11.02 13:06:34 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:34 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:34 - Connection terminated. I 2024.11.02 13:06:37 - Checking authorization ... . 2024.11.02 13:06:38 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:38 - Connecting to Maia (United States of America, Los Angeles) . 2024.11.02 13:06:38 - Routes, add 198.54.129.54/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:39 - Routes, add 198.54.129.54/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:39 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:39 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.129.54:443 . 2024.11.02 13:06:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:39 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:39 - OpenVPN > UDP link remote: [AF_INET]198.54.129.54:443 . 2024.11.02 13:06:39 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.129.54:443, sid=ca333f20 426e2fb0 . 2024.11.02 13:06:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:39 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:39 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:39 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Maia, emailAddress=info@airvpn.org . 2024.11.02 13:06:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:41 - OpenVPN > [Maia] Peer Connection Initiated with [AF_INET]198.54.129.54:443 . 2024.11.02 13:06:42 - OpenVPN > SENT CONTROL [Maia]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.202.1,dhcp-option DNS6 fde6:7a:7d20:aca::1,tun-ipv6,route-gateway 10.14.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:aca::1066/64 fde6:7a:7d20:aca::1,ifconfig 10.14.202.104 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.11.02 13:06:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.202.1' . 2024.11.02 13:06:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:aca::1' . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:42 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:42 - OpenVPN > open_tun . 2024.11.02 13:06:42 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:42 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:42 - Disconnecting . 2024.11.02 13:06:43 - Routes, delete 198.54.129.54/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:43 - Routes, delete 198.54.129.54/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:43 - Connection terminated. I 2024.11.02 13:06:46 - Checking authorization ... . 2024.11.02 13:06:46 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:46 - Connecting to Tejat (Canada, Toronto, Ontario) . 2024.11.02 13:06:47 - Routes, add 184.75.221.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:47 - Routes, add 184.75.221.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.197:443 . 2024.11.02 13:06:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:47 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.197:443 . 2024.11.02 13:06:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.197:443, sid=0820072f 9fdecb43 . 2024.11.02 13:06:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:47 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:47 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:47 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2024.11.02 13:06:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:47 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.197:443 . 2024.11.02 13:06:48 - OpenVPN > SENT CONTROL [Tejat]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:06:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.106.1,dhcp-option DNS6 fde6:7a:7d20:1b6a::1,tun-ipv6,route-gateway 10.31.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b6a::105f/64 fde6:7a:7d20:1b6a::1,ifconfig 10.31.106.97 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.11.02 13:06:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.106.1' . 2024.11.02 13:06:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1b6a::1' . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:48 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:48 - OpenVPN > open_tun . 2024.11.02 13:06:48 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:48 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:48 - Disconnecting . 2024.11.02 13:06:48 - Routes, delete 184.75.221.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:49 - Routes, delete 184.75.221.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:49 - Connection terminated. I 2024.11.02 13:06:52 - Checking authorization ... . 2024.11.02 13:06:52 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:53 - Connecting to Unukalhai (United States of America, New York City) . 2024.11.02 13:06:53 - Routes, add 198.44.136.246/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:53 - Routes, add 198.44.136.246/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.246:443 . 2024.11.02 13:06:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:53 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:53 - OpenVPN > UDP link remote: [AF_INET]198.44.136.246:443 . 2024.11.02 13:06:53 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.246:443, sid=c5100dc9 28ab93a5 . 2024.11.02 13:06:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:53 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:53 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:53 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Unukalhai, emailAddress=info@airvpn.org . 2024.11.02 13:06:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:53 - OpenVPN > [Unukalhai] Peer Connection Initiated with [AF_INET]198.44.136.246:443 . 2024.11.02 13:06:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.170.1,dhcp-option DNS6 fde6:7a:7d20:1caa::1,tun-ipv6,route-gateway 10.32.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1caa::1059/64 fde6:7a:7d20:1caa::1,ifconfig 10.32.170.91 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.11.02 13:06:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:06:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.170.1' . 2024.11.02 13:06:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1caa::1' . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:06:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:06:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:06:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:06:54 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:06:54 - OpenVPN > open_tun . 2024.11.02 13:06:54 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:06:54 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:06:54 - Disconnecting . 2024.11.02 13:06:54 - Routes, delete 198.44.136.246/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:55 - Routes, delete 198.44.136.246/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:06:55 - Connection terminated. I 2024.11.02 13:06:58 - Checking authorization ... . 2024.11.02 13:06:58 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:06:58 - Connecting to Wurren (Canada, Toronto, Ontario) . 2024.11.02 13:06:59 - Routes, add 199.189.27.125/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:06:59 - Routes, add 199.189.27.125/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:06:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:06:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:06:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:06:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:06:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:06:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.189.27.125:443 . 2024.11.02 13:06:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:06:59 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:06:59 - OpenVPN > UDP link remote: [AF_INET]199.189.27.125:443 . 2024.11.02 13:06:59 - OpenVPN > TLS: Initial packet from [AF_INET]199.189.27.125:443, sid=ab784886 c46e45fd . 2024.11.02 13:06:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:06:59 - OpenVPN > VERIFY KU OK . 2024.11.02 13:06:59 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:06:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:06:59 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:06:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Wurren, emailAddress=info@airvpn.org . 2024.11.02 13:06:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:06:59 - OpenVPN > [Wurren] Peer Connection Initiated with [AF_INET]199.189.27.125:443 . 2024.11.02 13:07:00 - OpenVPN > SENT CONTROL [Wurren]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:07:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.66.10.1,dhcp-option DNS6 fde6:7a:7d20:3e0a::1,tun-ipv6,route-gateway 10.66.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3e0a::10d8/64 fde6:7a:7d20:3e0a::1,ifconfig 10.66.10.218 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.11.02 13:07:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:07:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.66.10.1' . 2024.11.02 13:07:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3e0a::1' . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:07:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:07:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:07:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:00 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:07:00 - OpenVPN > open_tun . 2024.11.02 13:07:00 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:07:00 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:07:00 - Disconnecting . 2024.11.02 13:07:00 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:01 - Routes, delete 199.189.27.125/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:07:01 - Connection terminated. I 2024.11.02 13:07:04 - Checking authorization ... . 2024.11.02 13:07:05 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:07:05 - Connecting to Miram (Netherlands, Alblasserdam) . 2024.11.02 13:07:05 - Routes, add 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:05 - Routes, add 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:07:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:07:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:07:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:07:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.91:443 . 2024.11.02 13:07:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:07:05 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:07:05 - OpenVPN > UDP link remote: [AF_INET]213.152.162.91:443 . 2024.11.02 13:07:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.91:443, sid=5b896671 1de54ddb . 2024.11.02 13:07:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:07:06 - OpenVPN > VERIFY KU OK . 2024.11.02 13:07:06 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:07:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:07:06 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:07:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Miram, emailAddress=info@airvpn.org . 2024.11.02 13:07:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:07:07 - OpenVPN > [Miram] Peer Connection Initiated with [AF_INET]213.152.162.91:443 . 2024.11.02 13:07:08 - OpenVPN > SENT CONTROL [Miram]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:07:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.74.1,dhcp-option DNS6 fde6:7a:7d20:144a::1,tun-ipv6,route-gateway 10.24.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:144a::1009/64 fde6:7a:7d20:144a::1,ifconfig 10.24.74.11 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.11.02 13:07:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:07:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.74.1' . 2024.11.02 13:07:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:144a::1' . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:07:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:07:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:07:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:08 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:07:08 - OpenVPN > open_tun . 2024.11.02 13:07:08 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:07:08 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:07:08 - Disconnecting . 2024.11.02 13:07:09 - Routes, delete 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:09 - Routes, delete 213.152.162.91/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:07:09 - Connection terminated. I 2024.11.02 13:07:12 - Checking authorization ... . 2024.11.02 13:07:13 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:07:13 - Connecting to Nahn (Canada, Vancouver) . 2024.11.02 13:07:13 - Routes, add 192.30.89.69/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:14 - Routes, add 192.30.89.69/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:07:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:07:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:07:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:07:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443 . 2024.11.02 13:07:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:07:14 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:07:14 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443 . 2024.11.02 13:07:14 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=a2099cd4 0a2ecdc5 . 2024.11.02 13:07:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:07:14 - OpenVPN > VERIFY KU OK . 2024.11.02 13:07:14 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:07:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:07:14 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:07:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2024.11.02 13:07:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:07:14 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443 . 2024.11.02 13:07:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.74.1,dhcp-option DNS6 fde6:7a:7d20:1f4a::1,tun-ipv6,route-gateway 10.35.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f4a::101f/64 fde6:7a:7d20:1f4a::1,ifconfig 10.35.74.33 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.11.02 13:07:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:07:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.74.1' . 2024.11.02 13:07:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f4a::1' . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:07:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:07:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:07:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:15 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:07:15 - OpenVPN > open_tun . 2024.11.02 13:07:15 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:07:15 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:07:15 - Disconnecting . 2024.11.02 13:07:15 - Routes, delete 192.30.89.69/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:15 - Routes, delete 192.30.89.69/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:07:15 - Connection terminated. I 2024.11.02 13:07:19 - Checking authorization ... . 2024.11.02 13:07:19 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:07:19 - Connecting to Regulus (Canada, Toronto, Ontario) . 2024.11.02 13:07:20 - Routes, add 184.75.221.37/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:20 - Routes, add 184.75.221.37/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:07:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:07:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:07:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:07:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2024.11.02 13:07:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:07:20 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:07:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.37:443 . 2024.11.02 13:07:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=8cf31890 b7b41d50 . 2024.11.02 13:07:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:07:20 - OpenVPN > VERIFY KU OK . 2024.11.02 13:07:20 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:07:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:07:20 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:07:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2024.11.02 13:07:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:07:20 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2024.11.02 13:07:21 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:07:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.10.1,dhcp-option DNS6 fde6:7a:7d20:180a::1,tun-ipv6,route-gateway 10.28.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:180a::10f5/64 fde6:7a:7d20:180a::1,ifconfig 10.28.10.247 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.11.02 13:07:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:07:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.10.1' . 2024.11.02 13:07:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:180a::1' . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:07:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:07:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:07:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:21 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:07:21 - OpenVPN > open_tun . 2024.11.02 13:07:21 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:07:21 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:07:21 - Disconnecting . 2024.11.02 13:07:22 - Routes, delete 184.75.221.37/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:22 - Routes, delete 184.75.221.37/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:07:22 - Connection terminated. I 2024.11.02 13:07:25 - Checking authorization ... . 2024.11.02 13:07:26 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:07:26 - Connecting to Enif (Canada, Toronto, Ontario) . 2024.11.02 13:07:26 - Routes, add 104.254.90.245/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:26 - Routes, add 104.254.90.245/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:07:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:07:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:07:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:07:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:07:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:07:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2024.11.02 13:07:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:07:27 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:07:27 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2024.11.02 13:07:27 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=02ad50d6 85e28c6a . 2024.11.02 13:07:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:07:27 - OpenVPN > VERIFY KU OK . 2024.11.02 13:07:27 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:07:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:07:27 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:07:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2024.11.02 13:07:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:07:27 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 ! 2024.11.02 13:07:27 - Disconnecting . 2024.11.02 13:07:27 - Sending soft termination signal . 2024.11.02 13:07:30 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.11.02 13:07:30 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:07:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.74.1,dhcp-option DNS6 fde6:7a:7d20:c4a::1,tun-ipv6,route-gateway 10.16.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c4a::108f/64 fde6:7a:7d20:c4a::1,ifconfig 10.16.74.145 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.11.02 13:07:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:07:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.74.1' . 2024.11.02 13:07:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c4a::1' . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:07:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:07:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:07:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:07:30 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:07:30 - OpenVPN > open_tun . 2024.11.02 13:07:30 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:07:30 - OpenVPN > Exiting due to fatal error . 2024.11.02 13:07:30 - Routes, delete 104.254.90.245/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:07:30 - Routes, delete 104.254.90.245/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:07:30 - Connection terminated. I 2024.11.02 13:07:30 - Cancel requested. ! 2024.11.02 13:07:31 - Session terminated. I 2024.11.02 13:13:23 - Session starting. I 2024.11.02 13:13:24 - Checking authorization ... . 2024.11.02 13:13:25 - Using WinTun network interface "Local Area Connection (Kaspersky VPN)" ! 2024.11.02 13:13:25 - Connecting to Avior (Canada, Toronto, Ontario) . 2024.11.02 13:13:25 - Routes, add 184.75.223.237/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:13:26 - Routes, add 184.75.223.237/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2024.11.02 13:13:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.02 13:13:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.02 13:13:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.02 13:13:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:13:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:13:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.02 13:13:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.02 13:13:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2024.11.02 13:13:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.02 13:13:26 - OpenVPN > UDP link local: (not bound) . 2024.11.02 13:13:26 - OpenVPN > UDP link remote: [AF_INET]184.75.223.237:443 . 2024.11.02 13:13:26 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=b7f638f7 ce1338a5 . 2024.11.02 13:13:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.02 13:13:26 - OpenVPN > VERIFY KU OK . 2024.11.02 13:13:26 - OpenVPN > Validating certificate extended key usage . 2024.11.02 13:13:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.02 13:13:26 - OpenVPN > VERIFY EKU OK . 2024.11.02 13:13:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org . 2024.11.02 13:13:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.02 13:13:26 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 . 2024.11.02 13:13:27 - OpenVPN > SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) . 2024.11.02 13:13:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.234.1,dhcp-option DNS6 fde6:7a:7d20:6ea::1,tun-ipv6,route-gateway 10.10.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6ea::1078/64 fde6:7a:7d20:6ea::1,ifconfig 10.10.234.122 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.11.02 13:13:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.02 13:13:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.234.1' . 2024.11.02 13:13:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6ea::1' . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.02 13:13:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.02 13:13:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.02 13:13:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:13:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.02 13:13:29 - OpenVPN > interactive service msg_channel=0 . 2024.11.02 13:13:29 - OpenVPN > open_tun . 2024.11.02 13:13:29 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.11.02 13:13:29 - OpenVPN > Exiting due to fatal error ! 2024.11.02 13:13:29 - Disconnecting . 2024.11.02 13:13:29 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2024.11.02 13:13:29 - Routes, delete 184.75.223.237/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", not exists. . 2024.11.02 13:13:29 - Connection terminated. I 2024.11.02 13:13:32 - Cancel requested. ! 2024.11.02 13:13:32 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface_index": 3, "metric": 0, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "192.168.1.244\/32", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}" }, { "destination": "fe80::37e5:4652:6903:67c0\/128", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}" }, { "destination": "fe80::7bee:bfdb:8443:c75\/128", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}" }, { "destination": "fe80::932f:fe27:753d:dea8\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}" }, { "destination": "fe80::addf:63bb:14b6:8e75\/128", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "fe80::d407:286b:e0b:f589\/128", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 10, "metric": 256, "interface": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 12, "metric": 256, "interface": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}", "interfaces": [ { "friendly": "Ethernet", "id": "{7C7B8BDE-0FA1-4679-8A96-6942B85EDAE4}", "name": "Ethernet", "description": "Realtek(R) PCI(e) Ethernet Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::37e5:4652:6903:67c0", "169.254.92.185" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection", "id": "{F3B5FAAF-BF76-4D7E-A21E-3B6BBBC256A7}", "name": "Local Area Connection", "description": "Kaspersky VPN", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::932f:fe27:753d:dea8", "169.254.232.26" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{5D6AB423-2D0F-441B-96AD-A20EFF670FF9}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::7bee:bfdb:8443:c75", "169.254.38.206" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{A9116F2B-BD05-4027-B6A7-0354110A56F8}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d407:286b:e0b:f589", "169.254.62.188" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{08C3E88D-6B7D-4587-84A6-8FD9CBD20A4F}", "name": "Wi-Fi", "description": "Intel(R) Dual Band Wireless-AC 3160", "type": "Wireless80211", "status": "Up", "bytes_received": "2112403757", "bytes_sent": "70430753", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::addf:63bb:14b6:8e75", "192.168.1.244" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{08864DDB-5D24-11EF-ADE9-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DELLGray Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek(R) PCI(e) Ethernet Controller Physical Address. . . . . . . . . : 84-7B-EB-14-D4-3A DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Kaspersky VPN Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 2C-6E-85-28-DD-19 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 2E-6E-85-28-DD-18 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Dual Band Wireless-AC 3160 Physical Address. . . . . . . . . : 2C-6E-85-28-DD-18 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::addf:63bb:14b6:8e75%3(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.244(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Saturday, November 2, 2024 12:17:38 PM Lease Expires . . . . . . . . . . : Sunday, November 3, 2024 12:17:38 PM Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 53243525 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2E-53-34-7A-84-7B-EB-14-D4-3A DNS Servers . . . . . . . . . . . : 192.168.1.1 NetBIOS over Tcpip. . . . . . . . : Enabled