I 2024.11.24 11:25:16 - Session starting. I 2024.11.24 11:25:17 - Checking authorization ... . 2024.11.24 11:25:17 - Using WinTun network interface "OpenVPN Data Channel Offload for NordVPN (OpenVPN Data Channel Offload)" ! 2024.11.24 11:25:17 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.24 11:25:17 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:17 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", already exists. . 2024.11.24 11:25:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.24 11:25:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.24 11:25:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.24 11:25:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.24 11:25:18 - OpenVPN > UDP link local: (not bound) . 2024.11.24 11:25:18 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:18 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=fa969bbb f17814ba . 2024.11.24 11:25:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.24 11:25:18 - OpenVPN > VERIFY KU OK . 2024.11.24 11:25:18 - OpenVPN > Validating certificate extended key usage . 2024.11.24 11:25:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.24 11:25:18 - OpenVPN > VERIFY EKU OK . 2024.11.24 11:25:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.24 11:25:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.24 11:25:18 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:19 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.24 11:25:19 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.24 11:25:19 - Authorization failed. Look at the client area to discover the reason. . 2024.11.24 11:25:19 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.24 11:25:19 - Disconnecting . 2024.11.24 11:25:19 - Sending soft termination signal . 2024.11.24 11:25:22 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.24 11:25:22 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:22 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", not exists. . 2024.11.24 11:25:22 - Connection terminated. I 2024.11.24 11:25:25 - Checking authorization ... . 2024.11.24 11:25:26 - Using WinTun network interface "OpenVPN Data Channel Offload for NordVPN (OpenVPN Data Channel Offload)" ! 2024.11.24 11:25:26 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.24 11:25:26 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:26 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", already exists. . 2024.11.24 11:25:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.24 11:25:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.24 11:25:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.24 11:25:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.24 11:25:26 - OpenVPN > UDP link local: (not bound) . 2024.11.24 11:25:26 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:26 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=5d5371e8 122f2baa . 2024.11.24 11:25:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.24 11:25:26 - OpenVPN > VERIFY KU OK . 2024.11.24 11:25:26 - OpenVPN > Validating certificate extended key usage . 2024.11.24 11:25:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.24 11:25:26 - OpenVPN > VERIFY EKU OK . 2024.11.24 11:25:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.24 11:25:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.24 11:25:26 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:28 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.24 11:25:28 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.24 11:25:28 - Authorization failed. Look at the client area to discover the reason. . 2024.11.24 11:25:28 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.24 11:25:28 - Disconnecting . 2024.11.24 11:25:28 - Sending soft termination signal . 2024.11.24 11:25:31 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.24 11:25:31 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:31 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", not exists. . 2024.11.24 11:25:31 - Connection terminated. I 2024.11.24 11:25:34 - Checking authorization ... . 2024.11.24 11:25:34 - Using WinTun network interface "OpenVPN Data Channel Offload for NordVPN (OpenVPN Data Channel Offload)" ! 2024.11.24 11:25:34 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.24 11:25:35 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:35 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", already exists. . 2024.11.24 11:25:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.24 11:25:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.24 11:25:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.24 11:25:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.24 11:25:35 - OpenVPN > UDP link local: (not bound) . 2024.11.24 11:25:35 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=dab7cc5d 7c795778 . 2024.11.24 11:25:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.24 11:25:35 - OpenVPN > VERIFY KU OK . 2024.11.24 11:25:35 - OpenVPN > Validating certificate extended key usage . 2024.11.24 11:25:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.24 11:25:35 - OpenVPN > VERIFY EKU OK . 2024.11.24 11:25:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.24 11:25:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.24 11:25:35 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:36 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.24 11:25:36 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.24 11:25:36 - Authorization failed. Look at the client area to discover the reason. . 2024.11.24 11:25:36 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.24 11:25:36 - Disconnecting . 2024.11.24 11:25:36 - Sending soft termination signal . 2024.11.24 11:25:39 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.24 11:25:39 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:40 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", not exists. . 2024.11.24 11:25:40 - Connection terminated. I 2024.11.24 11:25:43 - Checking authorization ... . 2024.11.24 11:25:43 - Using WinTun network interface "OpenVPN Data Channel Offload for NordVPN (OpenVPN Data Channel Offload)" ! 2024.11.24 11:25:43 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.24 11:25:43 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:43 - Routes, add 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", already exists. . 2024.11.24 11:25:44 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.24 11:25:44 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.24 11:25:44 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.24 11:25:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.24 11:25:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.24 11:25:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.24 11:25:44 - OpenVPN > UDP link local: (not bound) . 2024.11.24 11:25:44 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:44 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=f1366f71 58c791e3 . 2024.11.24 11:25:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.24 11:25:44 - OpenVPN > VERIFY KU OK . 2024.11.24 11:25:44 - OpenVPN > Validating certificate extended key usage . 2024.11.24 11:25:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.24 11:25:44 - OpenVPN > VERIFY EKU OK . 2024.11.24 11:25:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.24 11:25:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.24 11:25:44 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.24 11:25:45 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.24 11:25:45 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.24 11:25:45 - Authorization failed. Look at the client area to discover the reason. . 2024.11.24 11:25:45 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.24 11:25:45 - Disconnecting . 2024.11.24 11:25:45 - Sending soft termination signal . 2024.11.24 11:25:48 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.24 11:25:48 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)". . 2024.11.24 11:25:48 - Routes, delete 184.75.208.244/32 for interface "Wi-Fi (RZ616 Wi-Fi 6E 160MHz)", not exists. . 2024.11.24 11:25:48 - Connection terminated. I 2024.11.24 11:25:49 - Cancel requested. ! 2024.11.24 11:25:49 - Session terminated.