. 2024.11.26 13:22:57 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.11.26 13:22:57 - Command line arguments (1): path="home" . 2024.11.26 13:22:58 - Reading options from C:\Users\Val\AppData\Local\Eddie\default.profile . 2024.11.26 13:22:58 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.11.26 13:22:58 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.11.26 13:22:58 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.11.26 13:22:59 - Ready . 2024.11.26 13:23:00 - Collect information about AirVPN completed I 2024.11.26 13:23:31 - Session starting. I 2024.11.26 13:23:31 - Checking authorization ... . 2024.11.26 13:23:32 - Added new network interface "Eddie", Wintun version 0.14 . 2024.11.26 13:23:32 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:23:32 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:23:32 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:32 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:23:32 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:23:32 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:23:32 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:23:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:23:32 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:23:32 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=0cabc6ac 2d2e4b4c . 2024.11.26 13:23:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:23:32 - OpenVPN > VERIFY KU OK . 2024.11.26 13:23:32 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:23:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:23:32 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:23:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:23:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:23:32 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:34 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:23:34 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:23:34 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:23:34 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:23:34 - Disconnecting . 2024.11.26 13:23:34 - Sending soft termination signal . 2024.11.26 13:23:37 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:23:37 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:37 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:23:37 - Connection terminated. I 2024.11.26 13:23:40 - Checking authorization ... . 2024.11.26 13:23:40 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:23:40 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:23:40 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:40 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:23:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:23:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:23:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:23:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:23:41 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:23:41 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=f894b4d5 ac53ee19 . 2024.11.26 13:23:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:23:41 - OpenVPN > VERIFY KU OK . 2024.11.26 13:23:41 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:23:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:23:41 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:23:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:23:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:23:41 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:42 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:23:42 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:23:42 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:23:42 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:23:42 - Disconnecting . 2024.11.26 13:23:42 - Sending soft termination signal . 2024.11.26 13:23:45 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:23:45 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:45 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:23:45 - Connection terminated. I 2024.11.26 13:23:48 - Checking authorization ... . 2024.11.26 13:23:49 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:23:49 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:23:49 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:49 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:23:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:23:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:23:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:23:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:23:49 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:23:49 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=21303f55 aa99f6b4 . 2024.11.26 13:23:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:23:49 - OpenVPN > VERIFY KU OK . 2024.11.26 13:23:49 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:23:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:23:49 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:23:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:23:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:23:49 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:50 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:23:50 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:23:50 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:23:50 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:23:50 - Disconnecting . 2024.11.26 13:23:50 - Sending soft termination signal . 2024.11.26 13:23:53 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:23:53 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:53 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:23:53 - Connection terminated. I 2024.11.26 13:23:56 - Checking authorization ... . 2024.11.26 13:23:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:23:57 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:23:57 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:23:57 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:23:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:23:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:23:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:23:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:23:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:23:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:23:57 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:23:57 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:57 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=7dacf01f dd16b376 . 2024.11.26 13:23:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:23:57 - OpenVPN > VERIFY KU OK . 2024.11.26 13:23:57 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:23:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:23:57 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:23:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:23:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:23:57 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:23:58 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:23:58 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:23:58 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:23:58 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:23:58 - Disconnecting . 2024.11.26 13:23:58 - Sending soft termination signal . 2024.11.26 13:24:01 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:24:01 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:01 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:24:01 - Connection terminated. I 2024.11.26 13:24:04 - Checking authorization ... . 2024.11.26 13:24:05 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:24:05 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:24:05 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:05 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:24:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:24:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:24:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:24:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:24:05 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:24:05 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:05 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=71909add 94310867 . 2024.11.26 13:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:24:05 - OpenVPN > VERIFY KU OK . 2024.11.26 13:24:05 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:24:05 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:24:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:24:05 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:06 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:24:06 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:24:06 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:24:06 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:24:06 - Disconnecting . 2024.11.26 13:24:06 - Sending soft termination signal . 2024.11.26 13:24:09 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:24:10 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:10 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:24:10 - Connection terminated. I 2024.11.26 13:24:13 - Checking authorization ... . 2024.11.26 13:24:13 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:24:13 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:24:13 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:13 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:24:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:24:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:24:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:24:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:24:13 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:24:13 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=2e7f7a91 d9794348 . 2024.11.26 13:24:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:24:13 - OpenVPN > VERIFY KU OK . 2024.11.26 13:24:13 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:24:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:24:13 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:24:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:24:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:24:13 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:15 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:24:15 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:24:15 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:24:15 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:24:15 - Disconnecting . 2024.11.26 13:24:15 - Sending soft termination signal . 2024.11.26 13:24:18 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:24:18 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:18 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:24:18 - Connection terminated. I 2024.11.26 13:24:21 - Checking authorization ... . 2024.11.26 13:24:21 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.11.26 13:24:21 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2024.11.26 13:24:22 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:22 - Routes, add 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", already exists. . 2024.11.26 13:24:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.11.26 13:24:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.11.26 13:24:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.11.26 13:24:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.11.26 13:24:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.11.26 13:24:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.11.26 13:24:22 - OpenVPN > UDP link local: (not bound) . 2024.11.26 13:24:22 - OpenVPN > UDP link remote: [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.208.244:443, sid=f0646713 5d20026f . 2024.11.26 13:24:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.11.26 13:24:22 - OpenVPN > VERIFY KU OK . 2024.11.26 13:24:22 - OpenVPN > Validating certificate extended key usage . 2024.11.26 13:24:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.11.26 13:24:22 - OpenVPN > VERIFY EKU OK . 2024.11.26 13:24:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2024.11.26 13:24:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.11.26 13:24:22 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]184.75.208.244:443 . 2024.11.26 13:24:23 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) . 2024.11.26 13:24:23 - OpenVPN > AUTH: Received control message: AUTH_FAILED W 2024.11.26 13:24:23 - Authorization failed. Look at the client area to discover the reason. . 2024.11.26 13:24:23 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2024.11.26 13:24:23 - Disconnecting . 2024.11.26 13:24:23 - Sending soft termination signal . 2024.11.26 13:24:26 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.11.26 13:24:26 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)". . 2024.11.26 13:24:26 - Routes, delete 184.75.208.244/32 for interface "Ethernet (Intel(R) Ethernet Connection (7) I219-V)", not exists. . 2024.11.26 13:24:26 - Connection terminated. I 2024.11.26 13:24:28 - Cancel requested. ! 2024.11.26 13:24:28 - Session terminated.