. 2024.11.19 11:17:18 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home Single Language, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.11.19 11:17:18 - Command line arguments (1): path="home" . 2024.11.19 11:17:22 - Reading options from C:\Users\danie\AppData\Local\Eddie\default.profile . 2024.11.19 11:17:23 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.11.19 11:17:23 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.11.19 11:17:23 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.11.19 11:17:24 - Ready . 2024.11.19 11:17:24 - Collect information about AirVPN completed ! 2024.11.19 11:17:57 - Logged out. I 2024.11.19 11:17:58 - Checking login ... ! 2024.11.19 11:17:58 - Logged in. I 2024.11.19 11:17:59 - Session starting. I 2024.11.19 11:18:00 - Checking authorization ... . 2024.11.19 11:18:01 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:18:01 - Connecting to Paikauhale (United States of America, New York City) . 2024.11.19 11:18:01 - Routes, add 198.44.136.254/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:01 - Routes, add 198.44.136.254/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:18:01 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:18:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:18:01 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:18:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.254:443 . 2024.11.19 11:18:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:18:01 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:18:01 - OpenVPN > UDP link remote: [AF_INET]198.44.136.254:443 . 2024.11.19 11:18:01 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.254:443, sid=88dece66 fd351302 . 2024.11.19 11:18:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:18:01 - OpenVPN > VERIFY KU OK . 2024.11.19 11:18:01 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:18:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:18:01 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:18:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Paikauhale, emailAddress=info@airvpn.org . 2024.11.19 11:18:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:18:01 - OpenVPN > [Paikauhale] Peer Connection Initiated with [AF_INET]198.44.136.254:443 . 2024.11.19 11:18:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.186.1,dhcp-option DNS6 fde6:7a:7d20:12ba::1,tun-ipv6,route-gateway 10.22.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12ba::1073/64 fde6:7a:7d20:12ba::1,ifconfig 10.22.186.117 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2024.11.19 11:18:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:18:02 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.186.1' . 2024.11.19 11:18:02 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12ba::1' . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:18:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:18:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:18:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:02 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:18:02 - OpenVPN > open_tun . 2024.11.19 11:18:02 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:18:02 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:18:02 - Disconnecting . 2024.11.19 11:18:02 - Routes, delete 198.44.136.254/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:02 - Routes, delete 198.44.136.254/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:18:02 - Connection terminated. I 2024.11.19 11:18:05 - Checking authorization ... . 2024.11.19 11:18:05 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:18:05 - Connecting to Terebellum (United States of America, New York City) . 2024.11.19 11:18:06 - Routes, add 198.44.136.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:06 - Routes, add 198.44.136.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:18:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:18:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:18:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:18:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.30:443 . 2024.11.19 11:18:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:18:06 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:18:06 - OpenVPN > UDP link remote: [AF_INET]198.44.136.30:443 . 2024.11.19 11:18:06 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.30:443, sid=4df9545d 37a6997b . 2024.11.19 11:18:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:18:06 - OpenVPN > VERIFY KU OK . 2024.11.19 11:18:06 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:18:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:18:06 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:18:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Terebellum, emailAddress=info@airvpn.org . 2024.11.19 11:18:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:18:06 - OpenVPN > [Terebellum] Peer Connection Initiated with [AF_INET]198.44.136.30:443 . 2024.11.19 11:18:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.68.26.1,dhcp-option DNS6 fde6:7a:7d20:401a::1,tun-ipv6,route-gateway 10.68.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:401a::1069/64 fde6:7a:7d20:401a::1,ifconfig 10.68.26.107 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.11.19 11:18:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:18:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.68.26.1' . 2024.11.19 11:18:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:401a::1' . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:18:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:18:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:18:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:07 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:18:07 - OpenVPN > open_tun . 2024.11.19 11:18:07 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:18:07 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:18:07 - Disconnecting . 2024.11.19 11:18:07 - Routes, delete 198.44.136.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:07 - Routes, delete 198.44.136.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:18:07 - Connection terminated. I 2024.11.19 11:18:10 - Checking authorization ... . 2024.11.19 11:18:10 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:18:10 - Connecting to Muliphein (United States of America, New York City) . 2024.11.19 11:18:11 - Routes, add 198.44.136.238/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:11 - Routes, add 198.44.136.238/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:18:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:18:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:18:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:18:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.238:443 . 2024.11.19 11:18:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:18:11 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:18:11 - OpenVPN > UDP link remote: [AF_INET]198.44.136.238:443 . 2024.11.19 11:18:11 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.238:443, sid=d19f77f7 14e119ef . 2024.11.19 11:18:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:18:11 - OpenVPN > VERIFY KU OK . 2024.11.19 11:18:11 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:18:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:18:11 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:18:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muliphein, emailAddress=info@airvpn.org . 2024.11.19 11:18:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:18:11 - OpenVPN > [Muliphein] Peer Connection Initiated with [AF_INET]198.44.136.238:443 . 2024.11.19 11:18:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.65.154.1,dhcp-option DNS6 fde6:7a:7d20:3d9a::1,tun-ipv6,route-gateway 10.65.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3d9a::1018/64 fde6:7a:7d20:3d9a::1,ifconfig 10.65.154.26 255.255.255.0,peer-id 16,cipher AES-256-GCM' . 2024.11.19 11:18:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:18:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.65.154.1' . 2024.11.19 11:18:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3d9a::1' . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:18:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:18:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:18:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:11 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:18:11 - OpenVPN > open_tun . 2024.11.19 11:18:11 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:18:11 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:18:11 - Disconnecting . 2024.11.19 11:18:12 - Routes, delete 198.44.136.238/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:12 - Routes, delete 198.44.136.238/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:18:12 - Connection terminated. I 2024.11.19 11:18:15 - Checking authorization ... . 2024.11.19 11:18:15 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:18:15 - Connecting to Unukalhai (United States of America, New York City) . 2024.11.19 11:18:15 - Routes, add 198.44.136.246/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:15 - Routes, add 198.44.136.246/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:18:16 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:18:16 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:18:16 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:18:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.246:443 . 2024.11.19 11:18:16 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:18:16 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:18:16 - OpenVPN > UDP link remote: [AF_INET]198.44.136.246:443 . 2024.11.19 11:18:16 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.246:443, sid=69091553 5a25b6f4 . 2024.11.19 11:18:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:18:16 - OpenVPN > VERIFY KU OK . 2024.11.19 11:18:16 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:18:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:18:16 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:18:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Unukalhai, emailAddress=info@airvpn.org . 2024.11.19 11:18:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:18:16 - OpenVPN > [Unukalhai] Peer Connection Initiated with [AF_INET]198.44.136.246:443 . 2024.11.19 11:18:16 - OpenVPN > SENT CONTROL [Unukalhai]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:18:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.67.154.1,dhcp-option DNS6 fde6:7a:7d20:3f9a::1,tun-ipv6,route-gateway 10.67.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3f9a::1066/64 fde6:7a:7d20:3f9a::1,ifconfig 10.67.154.104 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2024.11.19 11:18:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:18:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.67.154.1' . 2024.11.19 11:18:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3f9a::1' . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:18:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:18:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:18:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:16 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:18:16 - OpenVPN > open_tun . 2024.11.19 11:18:16 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:18:16 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:18:16 - Disconnecting . 2024.11.19 11:18:16 - Routes, delete 198.44.136.246/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:17 - Routes, delete 198.44.136.246/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:18:17 - Connection terminated. I 2024.11.19 11:18:20 - Checking authorization ... . 2024.11.19 11:18:20 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:18:20 - Connecting to Khambalia (United States of America, Phoenix, Arizona) . 2024.11.19 11:18:20 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:20 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:18:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:18:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:18:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:18:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:18:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:18:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.86:443 . 2024.11.19 11:18:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:18:20 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:18:20 - OpenVPN > UDP link remote: [AF_INET]198.44.133.86:443 . 2024.11.19 11:18:20 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.86:443, sid=8709f319 d94098d7 . 2024.11.19 11:18:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:18:21 - OpenVPN > VERIFY KU OK . 2024.11.19 11:18:21 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:18:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:18:21 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:18:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Khambalia, emailAddress=info@airvpn.org . 2024.11.19 11:18:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:18:21 - OpenVPN > [Khambalia] Peer Connection Initiated with [AF_INET]198.44.133.86:443 ! 2024.11.19 11:18:21 - Disconnecting . 2024.11.19 11:18:21 - Sending soft termination signal . 2024.11.19 11:18:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.11.19 11:18:24 - OpenVPN > SENT CONTROL [Khambalia]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:18:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.26.1,dhcp-option DNS6 fde6:7a:7d20:41a::1,tun-ipv6,route-gateway 10.8.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:41a::1043/64 fde6:7a:7d20:41a::1,ifconfig 10.8.26.69 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.11.19 11:18:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:18:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.26.1' . 2024.11.19 11:18:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:41a::1' . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:18:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:18:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:18:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:18:24 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:18:24 - OpenVPN > open_tun . 2024.11.19 11:18:24 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:18:24 - OpenVPN > Exiting due to fatal error . 2024.11.19 11:18:24 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:18:24 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:18:24 - Connection terminated. I 2024.11.19 11:18:24 - Cancel requested. ! 2024.11.19 11:18:24 - Session terminated. I 2024.11.19 11:21:16 - Session starting. I 2024.11.19 11:21:18 - Checking authorization ... . 2024.11.19 11:21:18 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:21:18 - Connecting to Khambalia (United States of America, Phoenix, Arizona) . 2024.11.19 11:21:19 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:19 - Routes, add 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:21:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:21:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:21:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:21:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.86:443 . 2024.11.19 11:21:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:21:19 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:21:19 - OpenVPN > UDP link remote: [AF_INET]198.44.133.86:443 . 2024.11.19 11:21:19 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.86:443, sid=f69b0804 8fc5c230 . 2024.11.19 11:21:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:21:19 - OpenVPN > VERIFY KU OK . 2024.11.19 11:21:19 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:21:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:21:19 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:21:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Khambalia, emailAddress=info@airvpn.org . 2024.11.19 11:21:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:21:19 - OpenVPN > [Khambalia] Peer Connection Initiated with [AF_INET]198.44.133.86:443 . 2024.11.19 11:21:20 - OpenVPN > SENT CONTROL [Khambalia]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:21:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.26.1,dhcp-option DNS6 fde6:7a:7d20:41a::1,tun-ipv6,route-gateway 10.8.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:41a::1043/64 fde6:7a:7d20:41a::1,ifconfig 10.8.26.69 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.11.19 11:21:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:21:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.26.1' . 2024.11.19 11:21:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:41a::1' . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:21:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:21:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:21:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:20 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:21:20 - OpenVPN > open_tun . 2024.11.19 11:21:20 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:21:20 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:21:20 - Disconnecting . 2024.11.19 11:21:21 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:21 - Routes, delete 198.44.133.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:21:21 - Connection terminated. I 2024.11.19 11:21:24 - Checking authorization ... . 2024.11.19 11:21:24 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:21:24 - Connecting to Xamidimura (United States of America, Los Angeles) . 2024.11.19 11:21:25 - Routes, add 198.54.129.46/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:25 - Routes, add 198.54.129.46/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:21:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:21:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:21:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:21:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.129.46:443 . 2024.11.19 11:21:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:21:25 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:21:25 - OpenVPN > UDP link remote: [AF_INET]198.54.129.46:443 . 2024.11.19 11:21:25 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.129.46:443, sid=ab57fae9 63237697 . 2024.11.19 11:21:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:21:25 - OpenVPN > VERIFY KU OK . 2024.11.19 11:21:25 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:21:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:21:25 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:21:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Xamidimura, emailAddress=info@airvpn.org . 2024.11.19 11:21:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:21:26 - OpenVPN > [Xamidimura] Peer Connection Initiated with [AF_INET]198.54.129.46:443 . 2024.11.19 11:21:26 - OpenVPN > SENT CONTROL [Xamidimura]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:21:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.154.1,dhcp-option DNS6 fde6:7a:7d20:169a::1,tun-ipv6,route-gateway 10.26.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:169a::100f/64 fde6:7a:7d20:169a::1,ifconfig 10.26.154.17 255.255.255.0,peer-id 19,cipher AES-256-GCM' . 2024.11.19 11:21:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:21:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.154.1' . 2024.11.19 11:21:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:169a::1' . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:21:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:21:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:21:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:26 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:21:26 - OpenVPN > open_tun . 2024.11.19 11:21:26 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:21:26 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:21:26 - Disconnecting . 2024.11.19 11:21:27 - Routes, delete 198.54.129.46/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:27 - Routes, delete 198.54.129.46/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:21:27 - Connection terminated. I 2024.11.19 11:21:30 - Checking authorization ... . 2024.11.19 11:21:31 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:21:31 - Connecting to Sarin (United States of America, Los Angeles) . 2024.11.19 11:21:31 - Routes, add 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:31 - Routes, add 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:21:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:21:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:21:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:21:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:21:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:21:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.129.62:443 . 2024.11.19 11:21:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:21:31 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:21:31 - OpenVPN > UDP link remote: [AF_INET]198.54.129.62:443 . 2024.11.19 11:21:31 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.129.62:443, sid=d71b38e1 5f236fb6 . 2024.11.19 11:21:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:21:32 - OpenVPN > VERIFY KU OK . 2024.11.19 11:21:32 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:21:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:21:32 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:21:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sarin, emailAddress=info@airvpn.org . 2024.11.19 11:21:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:21:32 - OpenVPN > [Sarin] Peer Connection Initiated with [AF_INET]198.54.129.62:443 ! 2024.11.19 11:21:32 - Disconnecting . 2024.11.19 11:21:32 - Sending soft termination signal . 2024.11.19 11:21:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.11.19 11:21:35 - OpenVPN > SENT CONTROL [Sarin]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:21:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.26.1,dhcp-option DNS6 fde6:7a:7d20:d1a::1,tun-ipv6,route-gateway 10.17.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d1a::10a8/64 fde6:7a:7d20:d1a::1,ifconfig 10.17.26.170 255.255.255.0,peer-id 18,cipher AES-256-GCM' . 2024.11.19 11:21:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:21:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.17.26.1' . 2024.11.19 11:21:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:d1a::1' . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:21:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:21:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:21:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:21:35 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:21:35 - OpenVPN > open_tun . 2024.11.19 11:21:35 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:21:35 - OpenVPN > Exiting due to fatal error . 2024.11.19 11:21:35 - Routes, delete 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:21:35 - Routes, delete 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:21:35 - Connection terminated. I 2024.11.19 11:21:35 - Cancel requested. ! 2024.11.19 11:21:35 - Session terminated. I 2024.11.19 11:22:40 - Session starting. I 2024.11.19 11:22:42 - Checking authorization ... . 2024.11.19 11:22:42 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:22:42 - Connecting to Sarin (United States of America, Los Angeles) . 2024.11.19 11:22:42 - Routes, add 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:43 - Routes, add 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:22:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:22:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:22:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:22:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.129.62:443 . 2024.11.19 11:22:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:22:43 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:22:43 - OpenVPN > UDP link remote: [AF_INET]198.54.129.62:443 . 2024.11.19 11:22:43 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.129.62:443, sid=78e23330 ea782afc . 2024.11.19 11:22:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:22:43 - OpenVPN > VERIFY KU OK . 2024.11.19 11:22:43 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:22:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:22:43 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:22:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sarin, emailAddress=info@airvpn.org . 2024.11.19 11:22:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:22:43 - OpenVPN > [Sarin] Peer Connection Initiated with [AF_INET]198.54.129.62:443 . 2024.11.19 11:22:44 - OpenVPN > SENT CONTROL [Sarin]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:22:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.26.1,dhcp-option DNS6 fde6:7a:7d20:d1a::1,tun-ipv6,route-gateway 10.17.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d1a::10a8/64 fde6:7a:7d20:d1a::1,ifconfig 10.17.26.170 255.255.255.0,peer-id 19,cipher AES-256-GCM' . 2024.11.19 11:22:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:22:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.17.26.1' . 2024.11.19 11:22:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:d1a::1' . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:22:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:22:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:22:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:44 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:22:44 - OpenVPN > open_tun . 2024.11.19 11:22:44 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:22:44 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:22:44 - Disconnecting . 2024.11.19 11:22:45 - Routes, delete 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:45 - Routes, delete 198.54.129.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:22:45 - Connection terminated. I 2024.11.19 11:22:48 - Checking authorization ... . 2024.11.19 11:22:49 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:22:49 - Connecting to Guniibuu (United States of America, Phoenix, Arizona) . 2024.11.19 11:22:50 - Routes, add 198.44.133.70/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:50 - Routes, add 198.44.133.70/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:22:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:22:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:22:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:22:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.70:443 . 2024.11.19 11:22:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:22:50 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:22:50 - OpenVPN > UDP link remote: [AF_INET]198.44.133.70:443 . 2024.11.19 11:22:50 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.70:443, sid=6745ddf2 94a335c1 . 2024.11.19 11:22:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:22:51 - OpenVPN > VERIFY KU OK . 2024.11.19 11:22:51 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:22:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:22:51 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:22:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Guniibuu, emailAddress=info@airvpn.org . 2024.11.19 11:22:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:22:51 - OpenVPN > [Guniibuu] Peer Connection Initiated with [AF_INET]198.44.133.70:443 . 2024.11.19 11:22:51 - OpenVPN > SENT CONTROL [Guniibuu]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:22:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.250.1,dhcp-option DNS6 fde6:7a:7d20:2fa::1,tun-ipv6,route-gateway 10.6.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2fa::1004/64 fde6:7a:7d20:2fa::1,ifconfig 10.6.250.6 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.11.19 11:22:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:22:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.250.1' . 2024.11.19 11:22:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2fa::1' . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:22:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:22:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:22:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:51 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:22:51 - OpenVPN > open_tun . 2024.11.19 11:22:51 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:22:51 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:22:51 - Disconnecting . 2024.11.19 11:22:52 - Routes, delete 198.44.133.70/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:52 - Routes, delete 198.44.133.70/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:22:52 - Connection terminated. I 2024.11.19 11:22:55 - Checking authorization ... . 2024.11.19 11:22:56 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:22:56 - Connecting to Maia (United States of America, Los Angeles) . 2024.11.19 11:22:56 - Routes, add 198.54.129.54/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:56 - Routes, add 198.54.129.54/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:22:56 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:22:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:22:56 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:22:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:22:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:22:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.129.54:443 . 2024.11.19 11:22:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:22:56 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:22:56 - OpenVPN > UDP link remote: [AF_INET]198.54.129.54:443 . 2024.11.19 11:22:57 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.129.54:443, sid=83af83b9 72944da9 . 2024.11.19 11:22:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:22:57 - OpenVPN > VERIFY KU OK . 2024.11.19 11:22:57 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:22:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:22:57 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:22:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Maia, emailAddress=info@airvpn.org . 2024.11.19 11:22:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:22:57 - OpenVPN > [Maia] Peer Connection Initiated with [AF_INET]198.54.129.54:443 . 2024.11.19 11:22:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.218.1,dhcp-option DNS6 fde6:7a:7d20:ada::1,tun-ipv6,route-gateway 10.14.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ada::1015/64 fde6:7a:7d20:ada::1,ifconfig 10.14.218.23 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.11.19 11:22:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:22:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.218.1' . 2024.11.19 11:22:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:ada::1' . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:22:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:22:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:22:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:22:58 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:22:58 - OpenVPN > open_tun . 2024.11.19 11:22:58 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:22:58 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:22:58 - Disconnecting . 2024.11.19 11:22:58 - Routes, delete 198.54.129.54/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:22:58 - Routes, delete 198.54.129.54/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:22:58 - Connection terminated. I 2024.11.19 11:23:01 - Checking authorization ... . 2024.11.19 11:23:02 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:23:02 - Connecting to Sheratan (United States of America, Phoenix, Arizona) . 2024.11.19 11:23:02 - Routes, add 198.44.133.78/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:02 - Routes, add 198.44.133.78/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:23:02 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:23:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:23:02 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:23:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.78:443 . 2024.11.19 11:23:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:23:02 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:23:02 - OpenVPN > UDP link remote: [AF_INET]198.44.133.78:443 . 2024.11.19 11:23:03 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.78:443, sid=3514cca3 40f909c8 . 2024.11.19 11:23:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:23:03 - OpenVPN > VERIFY KU OK . 2024.11.19 11:23:03 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:23:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:23:03 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:23:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheratan, emailAddress=info@airvpn.org . 2024.11.19 11:23:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:23:03 - OpenVPN > [Sheratan] Peer Connection Initiated with [AF_INET]198.44.133.78:443 . 2024.11.19 11:23:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.58.1,dhcp-option DNS6 fde6:7a:7d20:183a::1,tun-ipv6,route-gateway 10.28.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:183a::10d4/64 fde6:7a:7d20:183a::1,ifconfig 10.28.58.214 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.11.19 11:23:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:23:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.58.1' . 2024.11.19 11:23:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:183a::1' . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:23:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:23:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:23:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:04 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:23:04 - OpenVPN > open_tun . 2024.11.19 11:23:04 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:23:04 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:23:04 - Disconnecting . 2024.11.19 11:23:04 - Routes, delete 198.44.133.78/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:04 - Routes, delete 198.44.133.78/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:23:04 - Connection terminated. I 2024.11.19 11:23:07 - Checking authorization ... . 2024.11.19 11:23:08 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:23:08 - Connecting to Polis (United States of America, Raleigh, North Carolina) . 2024.11.19 11:23:08 - Routes, add 198.54.130.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:08 - Routes, add 198.54.130.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:23:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:23:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:23:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:23:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.54.130.30:443 . 2024.11.19 11:23:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:23:08 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:23:08 - OpenVPN > UDP link remote: [AF_INET]198.54.130.30:443 . 2024.11.19 11:23:08 - OpenVPN > TLS: Initial packet from [AF_INET]198.54.130.30:443, sid=37311825 effe6349 . 2024.11.19 11:23:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:23:08 - OpenVPN > VERIFY KU OK . 2024.11.19 11:23:08 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:23:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:23:08 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:23:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Polis, emailAddress=info@airvpn.org . 2024.11.19 11:23:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:23:08 - OpenVPN > [Polis] Peer Connection Initiated with [AF_INET]198.54.130.30:443 . 2024.11.19 11:23:09 - OpenVPN > SENT CONTROL [Polis]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:23:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.36.26.1,dhcp-option DNS6 fde6:7a:7d20:201a::1,tun-ipv6,route-gateway 10.36.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:201a::103f/64 fde6:7a:7d20:201a::1,ifconfig 10.36.26.65 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2024.11.19 11:23:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:23:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.36.26.1' . 2024.11.19 11:23:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:201a::1' . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:23:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:23:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:23:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:09 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:23:09 - OpenVPN > open_tun . 2024.11.19 11:23:09 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:23:09 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:23:09 - Disconnecting . 2024.11.19 11:23:09 - Routes, delete 198.54.130.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:10 - Routes, delete 198.54.130.30/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:23:10 - Connection terminated. I 2024.11.19 11:23:13 - Checking authorization ... . 2024.11.19 11:23:13 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:23:13 - Connecting to Pegasus (United States of America, Dallas, Texas) . 2024.11.19 11:23:14 - Routes, add 204.8.98.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:14 - Routes, add 204.8.98.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:23:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:23:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:23:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:23:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]204.8.98.62:443 . 2024.11.19 11:23:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:23:14 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:23:14 - OpenVPN > UDP link remote: [AF_INET]204.8.98.62:443 . 2024.11.19 11:23:14 - OpenVPN > TLS: Initial packet from [AF_INET]204.8.98.62:443, sid=68d8d89f 8829cd01 . 2024.11.19 11:23:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:23:14 - OpenVPN > VERIFY KU OK . 2024.11.19 11:23:14 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:23:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:23:14 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:23:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org . 2024.11.19 11:23:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:23:14 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]204.8.98.62:443 . 2024.11.19 11:23:15 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:23:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.90.1,dhcp-option DNS6 fde6:7a:7d20:165a::1,tun-ipv6,route-gateway 10.26.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:165a::1049/64 fde6:7a:7d20:165a::1,ifconfig 10.26.90.75 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.11.19 11:23:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:23:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.26.90.1' . 2024.11.19 11:23:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:165a::1' . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:23:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:23:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:23:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:15 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:23:15 - OpenVPN > open_tun . 2024.11.19 11:23:15 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:23:15 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:23:15 - Disconnecting . 2024.11.19 11:23:15 - Routes, delete 204.8.98.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:16 - Routes, delete 204.8.98.62/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:23:16 - Connection terminated. I 2024.11.19 11:23:19 - Checking authorization ... . 2024.11.19 11:23:19 - Using WinTun network interface "AVG Secure VPN (AVG Secure VPN Wintun Adapter)" ! 2024.11.19 11:23:19 - Connecting to Ran (United States of America, Dallas, Texas) . 2024.11.19 11:23:20 - Routes, add 204.8.98.72/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:20 - Routes, add 204.8.98.72/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", already exists. . 2024.11.19 11:23:20 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.19 11:23:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.19 11:23:20 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.19 11:23:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.19 11:23:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.19 11:23:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]204.8.98.72:443 . 2024.11.19 11:23:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.19 11:23:20 - OpenVPN > UDP link local: (not bound) . 2024.11.19 11:23:20 - OpenVPN > UDP link remote: [AF_INET]204.8.98.72:443 . 2024.11.19 11:23:20 - OpenVPN > TLS: Initial packet from [AF_INET]204.8.98.72:443, sid=89af1fff d5670590 . 2024.11.19 11:23:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.19 11:23:20 - OpenVPN > VERIFY KU OK . 2024.11.19 11:23:20 - OpenVPN > Validating certificate extended key usage . 2024.11.19 11:23:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.19 11:23:20 - OpenVPN > VERIFY EKU OK . 2024.11.19 11:23:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ran, emailAddress=info@airvpn.org . 2024.11.19 11:23:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.19 11:23:20 - OpenVPN > [Ran] Peer Connection Initiated with [AF_INET]204.8.98.72:443 . 2024.11.19 11:23:21 - OpenVPN > SENT CONTROL [Ran]: 'PUSH_REQUEST' (status=1) . 2024.11.19 11:23:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.186.1,dhcp-option DNS6 fde6:7a:7d20:17ba::1,tun-ipv6,route-gateway 10.27.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17ba::104c/64 fde6:7a:7d20:17ba::1,ifconfig 10.27.186.78 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.11.19 11:23:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.11.19 11:23:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.27.186.1' . 2024.11.19 11:23:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:17ba::1' . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.11.19 11:23:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.11.19 11:23:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.11.19 11:23:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.11.19 11:23:21 - OpenVPN > interactive service msg_channel=0 . 2024.11.19 11:23:21 - OpenVPN > open_tun . 2024.11.19 11:23:21 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.11.19 11:23:21 - OpenVPN > Exiting due to fatal error ! 2024.11.19 11:23:21 - Disconnecting . 2024.11.19 11:23:21 - Routes, delete 204.8.98.72/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)". . 2024.11.19 11:23:22 - Routes, delete 204.8.98.72/32 for interface "Wi-Fi (MediaTek Wi-Fi 6E MT7902 Wireless LAN Card)", not exists. . 2024.11.19 11:23:22 - Connection terminated. I 2024.11.19 11:23:25 - Cancel requested. ! 2024.11.19 11:23:25 - Session terminated.