. 2024.12.02 10:59:28 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2024.12.02 10:59:28 - Command line arguments (1): path="home" . 2024.12.02 10:59:29 - Reading options from C:\Users\Marce\AppData\Local\Eddie\default.profile . 2024.12.02 10:59:30 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.12.02 10:59:30 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.12.02 10:59:30 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.12.02 10:59:31 - Ready . 2024.12.02 10:59:34 - Collect information about AirVPN completed I 2024.12.02 10:59:39 - Checking login ... ! 2024.12.02 10:59:40 - Logged in. I 2024.12.02 10:59:43 - Session starting. I 2024.12.02 10:59:45 - Checking authorization ... . 2024.12.02 10:59:45 - Using WinTun network interface "OpenVPN Connect DCO Adapter (OpenVPN Data Channel Offload)" ! 2024.12.02 10:59:45 - Connecting to Aquila (United States of America, Fremont, California) . 2024.12.02 10:59:46 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))". . 2024.12.02 10:59:46 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))", already exists. . 2024.12.02 10:59:46 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.02 10:59:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.02 10:59:46 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.02 10:59:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.02 10:59:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.02 10:59:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.02 10:59:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.02 10:59:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443 . 2024.12.02 10:59:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.02 10:59:46 - OpenVPN > UDP link local: (not bound) . 2024.12.02 10:59:46 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443 . 2024.12.02 10:59:48 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=66d8dfea ad1f3894 . 2024.12.02 10:59:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.02 10:59:48 - OpenVPN > VERIFY KU OK . 2024.12.02 10:59:48 - OpenVPN > Validating certificate extended key usage . 2024.12.02 10:59:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.02 10:59:48 - OpenVPN > VERIFY EKU OK . 2024.12.02 10:59:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org . 2024.12.02 10:59:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.02 10:59:48 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]23.130.104.132:443 . 2024.12.02 10:59:49 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1) . 2024.12.02 10:59:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.174.1,dhcp-option DNS6 fde6:7a:7d20:5ae::1,tun-ipv6,route-gateway 10.9.174.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5ae::1017/64 fde6:7a:7d20:5ae::1,ifconfig 10.9.174.25 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.12.02 10:59:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.02 10:59:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.174.1' . 2024.12.02 10:59:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5ae::1' . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.12.02 10:59:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.02 10:59:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.02 10:59:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.02 10:59:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.02 10:59:49 - OpenVPN > interactive service msg_channel=0 . 2024.12.02 10:59:49 - OpenVPN > open_tun . 2024.12.02 10:59:49 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.12.02 10:59:49 - OpenVPN > Exiting due to fatal error ! 2024.12.02 10:59:49 - Disconnecting . 2024.12.02 10:59:49 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))". . 2024.12.02 10:59:49 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))", not exists. . 2024.12.02 10:59:49 - Connection terminated. I 2024.12.02 10:59:52 - Checking authorization ... . 2024.12.02 10:59:53 - Using WinTun network interface "OpenVPN Connect DCO Adapter (OpenVPN Data Channel Offload)" ! 2024.12.02 10:59:53 - Connecting to Vulpecula (United States of America, Dallas, Texas) . 2024.12.02 10:59:53 - Routes, add 204.8.98.102/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))". . 2024.12.02 10:59:53 - Routes, add 204.8.98.102/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))", already exists. . 2024.12.02 10:59:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.02 10:59:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.02 10:59:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.02 10:59:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.02 10:59:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.02 10:59:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.02 10:59:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.02 10:59:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]204.8.98.102:443 . 2024.12.02 10:59:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.02 10:59:53 - OpenVPN > UDP link local: (not bound) . 2024.12.02 10:59:53 - OpenVPN > UDP link remote: [AF_INET]204.8.98.102:443 . 2024.12.02 10:59:53 - OpenVPN > TLS: Initial packet from [AF_INET]204.8.98.102:443, sid=866e09d6 dd983928 . 2024.12.02 10:59:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.02 10:59:54 - OpenVPN > VERIFY KU OK . 2024.12.02 10:59:54 - OpenVPN > Validating certificate extended key usage . 2024.12.02 10:59:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.02 10:59:54 - OpenVPN > VERIFY EKU OK . 2024.12.02 10:59:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Vulpecula, emailAddress=info@airvpn.org . 2024.12.02 10:59:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.02 10:59:54 - OpenVPN > [Vulpecula] Peer Connection Initiated with [AF_INET]204.8.98.102:443 . 2024.12.02 10:59:54 - OpenVPN > SENT CONTROL [Vulpecula]: 'PUSH_REQUEST' (status=1) . 2024.12.02 10:59:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.110.1,dhcp-option DNS6 fde6:7a:7d20:1c6e::1,tun-ipv6,route-gateway 10.32.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c6e::106c/64 fde6:7a:7d20:1c6e::1,ifconfig 10.32.110.110 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2024.12.02 10:59:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.02 10:59:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.110.1' . 2024.12.02 10:59:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c6e::1' . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.12.02 10:59:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.02 10:59:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.02 10:59:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.02 10:59:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.02 10:59:54 - OpenVPN > interactive service msg_channel=0 . 2024.12.02 10:59:54 - OpenVPN > open_tun . 2024.12.02 10:59:54 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2024.12.02 10:59:54 - OpenVPN > Exiting due to fatal error ! 2024.12.02 10:59:54 - Disconnecting . 2024.12.02 10:59:54 - Routes, delete 204.8.98.102/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))". . 2024.12.02 10:59:55 - Routes, delete 204.8.98.102/32 for interface "Wi-Fi (Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W))", not exists. . 2024.12.02 10:59:55 - Connection terminated. I 2024.12.02 10:59:56 - Cancel requested. ! 2024.12.02 10:59:56 - Session terminated.