Jump to content
Not connected, Your IP: 3.234.210.89

All Activity

This stream auto-updates     

  1. Past hour
  2. No g.o Netsh command failed...
  3. Today
  4. If nothing comes up this weekend, maybe the Halloween sale was it instead? Next regular would be New Year's Eve, but let's monitor it. And please don't post "I'm also wondering about it" posts. Many users are wondering, it's not just you, i.e., we don't need to know each user wondering.
  5. Search returns no results. You can be the first! Anything specific you need help with?
  6. In Preferences, can you disable the DNS leak protection? It seems to fail exactly on setting the DNS server:
  7. I used to renew on Black Friday. Nothing this year?
  8. Hi, wondering about this as well. It is Black Friday now and I was thinking of getting a three-year subscription. Is the sale happening or not?
  9. hi there, Has anyone been able to setup airvpn on the tp-link mr200 LTE router? Thanks
  10. Thanks for your reply. Things I've done: Disabled default gateway option Updated to Eddie to 2.16.4 Never use standby Ran eddie with firewall+antivir temporairly disbled Have not had a windows update in almost a month and as this problem is only a week old I've left that Set eddie to block ipv6 Result: Some new items in the log files but the infamous NETSH command failed error code 1 marches blithely on. A thought; would updating openvpn to 2.4.8 make a difference?
  11. @dedo299 Hello! We have picked a datecenter in Los Angeles to replace Fremont servers (quite near in terms of network distance and very near geographically). The new LA servers announcement, where we specified that they replaced servers in Fremont, is here: Kind regards
  12. I don't see any replacements for Heze and Persei in the Fremont location. Aquila is the only server left. Can you clarify what you mean by "replaced"? Thanks I see now from your server update messages, which I hadn't looked at prior to my comment above, that these two Fremont servers have been replaced by two new Los Angeles servers. My experience is that Fremont is faster than Los Angeles for San Francisco Bay Area users. SFBay Area has a population of about 8 million, second only to Los Angeles, in California. Seems like we're being short-changed what with losing two out of three local servers. Any good reason for this?
  13. Yesterday
  14. Hello! We inform you that the following servers will be dismissed on November the 26th as they do not meet anymore our quality requirements in terms of line reliability and datacenter support. Alkaid Heze Microscopium Pavonis Persei The aforementioned servers have already been replaced by other servers in the same locations, running in datacenters which are currently offering higher reliability. You can check the servers status and additional information on our servers monitor here: https://airvpn.org/status Kind regards AirVPN Staff
  15. Firefox plugins: Multi account containers and also cyberdec anitfingerprinting plugin. The last one does break sites so you have to spend some time reduce your protection on some sites or go elsewhere.
  16. I'd like to add a few things. uMatrix and NoScript are very technical, especially the first one. You will not get good results if you don't have basic knowledge about how content on a website is processed by your browser. For Firefox site isolation there's the built-in First Party Isolation setting in about:config which also isolates addons (privacy.firstparty.isolate). Some websites won't load with the outdated library versions Decentraleyes provides, especially jQuery. If you want an overview on the capabilities your browser provides for tracking, see EFF's Panopticlick. See it as an orientation.
  17. Well, don't remove it. Disable the option in Preferences. And looking down the log I think it contributes to your demise. Though the v4 route seems to work... . 2019.11.20 09:27:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.2.1,route-gateway 10.20.2.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.2.164 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2019.11.20 09:27:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' [...] . 2019.11.20 09:29:36 - Shell(60) of 'cmd.exe', 2 args: '/c';'route delete 0.0.0.0 mask 0.0.0.0 192.168.178.1 if 13'; . 2019.11.20 09:29:36 - Shell(60) done in 78 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:36 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.178.1 . 2019.11.20 09:29:36 - Shell(61) of 'cmd.exe', 2 args: '/c';'route delete 0.0.0.0 mask 128.0.0.0 10.20.2.1 if 28'; . 2019.11.20 09:29:36 - Shell(61) done in 62 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:36 - Routes, removed an existing route, 0.0.0.0/1 for gateway 10.20.2.1 . 2019.11.20 09:29:36 - Shell(62) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 del route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217"'; . 2019.11.20 09:29:39 - Shell(62) done in 2948 ms, exit: 0, out: 'Ok.' . 2019.11.20 09:29:39 - Routes, removed an existing route, ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:39 - Routes, remove ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: Network interface no more available. . 2019.11.20 09:29:39 - Above log line repeated 1 times more . 2019.11.20 09:29:39 - Shell(63) of 'cmd.exe', 2 args: '/c';'route add 91.214.169.69 mask 255.255.255.255 10.20.2.1 if 28'; . 2019.11.20 09:29:39 - Shell(63) done in 62 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:39 - Routes, added a new route, 91.214.169.69 for gateway 10.20.2.1 . 2019.11.20 09:29:39 - Flushing DNS . 2019.11.20 09:29:39 - Shell(64) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns'; . 2019.11.20 09:31:34 - Shell(64) done in 115066 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 09:31:34 - Successfully flushed the DNS Resolver Cache.' . 2019.11.20 09:31:34 - Shell(65) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns'; . 2019.11.20 09:31:41 - Shell(65) done in 6100 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 09:31:41 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.' I 2019.11.20 09:31:41 - Checking route IPv4 I 2019.11.20 09:31:41 - Checking DNS ! 2019.11.20 09:33:11 - Connected. . 2019.11.20 09:33:12 - OpenVPN > Initialization Sequence Completed . 2019.11.20 09:36:44 - Updating systems & servers data ... . 2019.11.20 09:36:44 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 09:36:44 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) And update to at least the current stable 2.16.4. You could also try setting IPv6 to Block in Eddie preferences. Assuming because of this line: What else?.. Erm.. if you used standby while connected, don't do that. if you are using any personal firewalls or security software, maybe they are interfering? maybe a Windows update screwed something up?
  18. I see you're explicit with word value. If you are interested in saving a bit of money, then PIA would be your best interests. There are multiple advantage to remain on AirVPN over PIA: Torrenting are allowed on any server. PIA only allow torrents on specific server, I don't know if this policy changed. Remote Port Forwarding. If you torrents, AirVPN have port forwarding process in place and still hide your IP. When the peer connect to you, it will communicate to your torrent client via AirVPN server as a middlemen. It will direct the communication request to AirVPN server, then the server will redirect it to you. I believe only 3 VPN providers (including AirVPN) out of thousands of VPN offers this service. And best of all, you don't need to configure it in the router. AirVPN's Network Lock over PIA's Kill Switch. Network Lock is vastly superior over other VPN's Kill switch. Network Lock use strict firewall rules (via Windows Firewall) that handle the traffic than relying on other VPN's monitoring. That mean every single bit (even sub-bit if there is a thing) of traffic will go through Window Firewall via Network Lock. VPN only can kill the connection as long the VPN client is active. If the other VPN client crashed, then you are SOL since the floodgate will open which will expose you back. Network Lock put the control in Window Firewall. If Eddie crashed, you are remain safe since Window Firewall handle the traffic. Even it persist through restart until you start up Eddie then deactivate the network lock. That is why Kill Switch is ineffective. Local LAN in Network Lock. Even with Network Lock, I can print to my printer in my local LAN as long I have "Allow Lan/Private" enabled. My phone communicating with my laptop. My Emby client communicating with Emby Server in computer. If "Allow Lan/Private" is disabled, LAN and outside are fully blocked and cannot communicate to my laptop as long the Network Lock is active. Protocols. Based on my experience with PIA (more than 4 years ago), it didn't have the flexibility of protocols of what AirVPN have. If Eddie attempt to connect to AirVPN server, it will attempt to use the first protocol which is UDP 443. If Eddie detect a block, it will move on to the next line which is TCP 443. If that is block, it will keep going through the list until it successfully connect to the server. PIA's UDP is blocked in my university, they blocked the majority of UDP. And it seem that PIA does not have a fallback option which cause PIA to keep going through the server name which cause it stuck to be in a loop. My first attempt with AirVPN that it successfully connected to the server after the first protocol failed (UDP). I don't know if PIA recently expand their protocols. AirVPN have over 20 protocols as a fallback option. OpenVPN. AirVPN offer OpenVPN config files if the device you are using don't have Eddie. Personal Support from Staff and Community. You get a personal support from the staff and the community to ensure you get the support you need. Staff might be slow to respond, usually a day or two. But you also get a support from the community like us who through the similar experience and guide you to the right place. Transparency. AirVPN is transparent with their mission and their goals. If something happen to the server, they will let us know within reasonable time. They don't do what NordVPN handled with their server recently. Even AirVPN immediately informed us about the Russian server shutdown, Recently PIA informed their consumer of South African server is being removed. Consumers there seem to be upset that they are not informed a reasonable time about it. That is so far I know in my head. There are likely to be more but this is what I know for now. I never had issues with AirVPN and they always provide the highest quality of services as possible to us. That why I am their consumer for more than 4 years.
  19. I'm assuming you are using Windows. Click Start then type "Device Manager" without the quote. Click Device Manager, then it will open Device Manager window. Look for "Network adapters" then expand it. You should see "TAP-Windows Adapter V9", right click that one then click Uninstall device. It will ask you if you really want to uninstall it, click Uninstall. Once you are done, reopen Eddie then click connect. Eddie will detect TAP is not in the system and will install TAP automatically. Then it will attempt to connect to VPN server. If it taking too long to connect to the VPN server (like more than 1 min), click cancel then exit Eddie fully. Then start up Eddie then click to connect.
  20. Google have trackers across the internet that are capable of knowing who you are based on the fingerprinting and various method of your browser headers, IP, and your phone. Google are not the only one whom does this, Facebook, Amazon and few others have the same capabilities. It can be through the ads, tags, CDNs, fonts, cookies, local storage, etc (really, the list goes on and on and on). Yes, it may be a huge shock to you but it been like that for a long time. I remember reading the article back in 2007 the concerns about Facebook Beacon and SuperCookie. VPN is not designed for a full anonymity, it is only designed to encrypted the transmission between you and the VPN server to prevent anyone seeing what is in the transmission. The only they can see it is scrambled information between you and the VPN server. Since you said webpage, I would assume you are looking YouTube through a browser. It is likely you don't have a privacy protection addons and browser. Combine them with VPN will get you closer to a full anonymity. If you are using Google Chrome, avoid it all cost since it come with Google services that are capable of tracking you. Try Firefox Quantum (if you have used it in the past, try it now since they have improved a lot) since it come with privacy protection built in. Or any Chromium-based browser such as Brave. If you want to get closer to full anonymity, then you need to get addons such as uBlock Origin for blocking ads and specific element, Privacy Badger for scrambling your information to the trackers, uMatrix for granular control over specific requests and it also have auto cookie destruction (some people prefer NoScript), HTTPS Everywhere for forcing the site to HTTPS and will fall back to HTTP if it didn't have HTTPS, Firefox Multi-Account Containers for site isolation to prevent cross-tracking other tabs, Decentraleyes for tracking protection in CDNs. See how much we uses those addons? Yea, that how BIG they are tracking us since it made them money to sell to third-party.
  21. W 2019.11.20 09:26:16 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:16 - Shell(12) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=286'; . 2019.11.20 09:26:17 - Shell(12) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:17 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:17 - Shell(13) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:17 - Shell(13) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:17 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:17 - Shell(14) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:17 - Shell(14) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:17 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:17 - Shell(15) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=276'; . 2019.11.20 09:26:17 - Shell(15) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:17 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:17 - Shell(16) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:18 - Shell(16) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:18 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:18 - Shell(17) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=276'; . 2019.11.20 09:26:18 - Shell(17) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:18 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:18 - Shell(18) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=286'; . 2019.11.20 09:26:18 - Shell(18) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:18 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:18 - Shell(19) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:18 - Shell(19) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:18 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:18 - Shell(20) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=276'; . 2019.11.20 09:26:19 - Shell(20) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:19 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:19 - Shell(21) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=286'; . 2019.11.20 09:26:19 - Shell(21) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:19 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:19 - Shell(22) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=296'; . 2019.11.20 09:26:19 - Shell(22) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:19 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:19 - Shell(23) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=306'; . 2019.11.20 09:26:19 - Shell(23) done in 124 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:19 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:19 - Shell(24) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=316'; . 2019.11.20 09:26:19 - Shell(24) done in 124 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:19 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:20 - Shell(25) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=326'; . 2019.11.20 09:26:20 - Shell(25) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:20 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:20 - Shell(26) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=336'; . 2019.11.20 09:26:20 - Shell(26) done in 171 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:20 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:20 - Shell(27) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=346'; . 2019.11.20 09:26:20 - Shell(27) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:20 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:20 - Shell(28) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=356'; . 2019.11.20 09:26:20 - Shell(28) done in 140 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:20 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:21 - Shell(29) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=366'; . 2019.11.20 09:26:21 - Shell(29) done in 124 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:21 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:21 - Shell(30) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=376'; . 2019.11.20 09:26:21 - Shell(30) done in 140 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:21 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:21 - Shell(31) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=386'; . 2019.11.20 09:26:21 - Shell(31) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:21 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:21 - Shell(32) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=396'; . 2019.11.20 09:26:21 - Shell(32) done in 140 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:21 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:22 - Shell(33) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=406'; . 2019.11.20 09:26:22 - Shell(33) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:22 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:22 - Shell(34) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=416'; . 2019.11.20 09:26:22 - Shell(34) done in 140 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:22 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:22 - Shell(35) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=426'; . 2019.11.20 09:26:22 - Shell(35) done in 156 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:22 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:22 - Shell(36) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=436'; . 2019.11.20 09:26:22 - Shell(36) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:22 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:23 - Shell(37) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=446'; . 2019.11.20 09:26:23 - Shell(37) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:23 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:23 - Shell(38) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=456'; . 2019.11.20 09:26:23 - Shell(38) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:23 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:23 - Shell(39) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=466'; . 2019.11.20 09:26:23 - Shell(39) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:23 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:23 - Shell(40) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=476'; . 2019.11.20 09:26:23 - Shell(40) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:23 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:24 - Shell(41) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=486'; . 2019.11.20 09:26:24 - Shell(41) done in 140 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:24 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:24 - Routes, remove 184.75.221.3 for gateway 10.20.224.1 failed: Network interface no more available. . 2019.11.20 09:26:24 - Shell(42) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:24 - Shell(42) done in 172 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:24 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:24 - Routes, remove 184.75.221.3 for gateway 10.20.224.1 failed: Network interface no more available. . 2019.11.20 09:26:24 - Shell(43) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=276'; . 2019.11.20 09:26:24 - Shell(43) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:24 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:25 - Routes, remove 184.75.221.3 for gateway 10.20.224.1 failed: Network interface no more available. . 2019.11.20 09:26:25 - Shell(44) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=286'; . 2019.11.20 09:26:25 - Shell(44) done in 141 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:25 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:25 - Shell(45) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=296'; . 2019.11.20 09:26:25 - Shell(45) done in 109 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:25 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:25 - Shell(46) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=306'; . 2019.11.20 09:26:25 - Shell(46) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:25 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:25 - Shell(47) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=316'; . 2019.11.20 09:26:26 - Shell(47) done in 171 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:26 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:26 - Shell(48) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=326'; . 2019.11.20 09:26:26 - Shell(48) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:26 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:26 - Routes, remove 62.102.148.160 for gateway 10.18.160.1 failed: Network interface no more available. . 2019.11.20 09:26:26 - Routes, remove 185.156.175.43 for gateway 10.18.96.1 failed: Network interface no more available. . 2019.11.20 09:26:26 - Routes, remove 213.152.161.181 for gateway 10.5.128.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Above log line repeated 12 times more . 2019.11.20 09:26:28 - Routes, remove 103.16.27.86 for gateway 10.26.224.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Routes, remove 213.152.161.101 for gateway 10.17.160.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Above log line repeated 1 times more . 2019.11.20 09:26:28 - Routes, remove 213.152.161.10 for gateway 10.10.96.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Routes, remove 213.152.162.170 for gateway 10.12.128.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Routes, remove 213.152.161.101 for gateway 10.17.160.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Routes, remove 103.16.27.86 for gateway 10.26.224.1 failed: Network interface no more available. . 2019.11.20 09:26:28 - Routes, remove 213.152.161.229 for gateway 10.9.0.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Above log line repeated 1 times more . 2019.11.20 09:26:29 - Routes, remove 103.16.27.86 for gateway 10.26.224.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Above log line repeated 1 times more . 2019.11.20 09:26:29 - Routes, remove 184.75.223.219 for gateway 10.24.0.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:29 - Routes, remove 184.75.223.219 for gateway 10.24.0.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Above log line repeated 1 times more . 2019.11.20 09:26:30 - Routes, remove 137.63.71.51 for gateway 10.31.64.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 137.63.71.51 for gateway 10.31.64.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 184.75.223.219 for gateway 10.24.0.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 213.152.162.114 for gateway 10.30.32.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 184.75.223.219 for gateway 10.24.0.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 213.152.161.229 for gateway 10.9.0.1 failed: Network interface no more available. . 2019.11.20 09:26:30 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Routes, remove 184.75.223.219 for gateway 10.24.0.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Routes, remove 137.63.71.51 for gateway 10.31.64.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Routes, remove 184.75.221.203 for gateway 10.6.192.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Routes, remove 137.63.71.51 for gateway 10.31.64.1 failed: Network interface no more available. . 2019.11.20 09:26:31 - Above log line repeated 2 times more . 2019.11.20 09:26:31 - Routes, remove 213.152.161.101 for gateway 10.17.160.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 213.152.161.234 for gateway 10.27.128.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 178.162.212.214 for gateway 10.13.192.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 213.152.161.101 for gateway 10.17.160.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 194.187.251.155 for gateway 10.21.128.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 184.75.221.35 for gateway 10.28.0.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Above log line repeated 1 times more . 2019.11.20 09:26:32 - Routes, remove 213.152.161.239 for gateway 10.25.224.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 184.75.221.35 for gateway 10.28.0.1 failed: Network interface no more available. . 2019.11.20 09:26:32 - Routes, remove 213.152.161.219 for gateway 10.12.96.1 failed: Network interface no more available. . 2019.11.20 09:26:33 - Routes, remove 184.75.221.35 for gateway 10.28.0.1 failed: Network interface no more available. . 2019.11.20 09:26:33 - Routes, remove 213.152.162.114 for gateway 10.30.32.1 failed: Network interface no more available. . 2019.11.20 09:26:33 - Routes, remove 184.75.221.35 for gateway 10.28.0.1 failed: Network interface no more available. . 2019.11.20 09:26:33 - Above log line repeated 4 times more . 2019.11.20 09:26:33 - Routes, remove 213.152.161.117 for gateway 10.5.192.1 failed: Network interface no more available. . 2019.11.20 09:26:33 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Above log line repeated 1 times more . 2019.11.20 09:26:34 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Above log line repeated 1 times more . 2019.11.20 09:26:34 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:34 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:35 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:35 - Routes, remove 185.156.175.35 for gateway 10.4.128.1 failed: Network interface no more available. . 2019.11.20 09:26:35 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:35 - Above log line repeated 1 times more . 2019.11.20 09:26:35 - Routes, remove 185.156.175.35 for gateway 10.4.128.1 failed: Network interface no more available. . 2019.11.20 09:26:35 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Above log line repeated 1 times more . 2019.11.20 09:26:36 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Above log line repeated 2 times more . 2019.11.20 09:26:36 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Routes, remove 185.156.175.171 for gateway 10.4.96.1 failed: Network interface no more available. . 2019.11.20 09:26:36 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Above log line repeated 1 times more . 2019.11.20 09:26:37 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 195.206.105.203 for gateway 10.17.128.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 185.156.175.35 for gateway 10.4.128.1 failed: Network interface no more available. . 2019.11.20 09:26:37 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 185.156.175.35 for gateway 10.4.128.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 46.19.137.116 for gateway 10.32.32.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Above log line repeated 2 times more . 2019.11.20 09:26:38 - Routes, remove 185.156.175.35 for gateway 10.4.128.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 185.156.175.59 for gateway 10.30.64.1 failed: Network interface no more available. . 2019.11.20 09:26:38 - Routes, remove 91.214.169.69 for gateway 10.20.0.1 failed: Network interface no more available. . 2019.11.20 09:26:41 - Above log line repeated 19 times more . 2019.11.20 09:26:41 - Shell(49) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=476'; . 2019.11.20 09:26:41 - Shell(49) done in 172 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:41 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:41 - Shell(50) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=486'; . 2019.11.20 09:26:41 - Shell(50) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:41 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:41 - Shell(51) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=496'; . 2019.11.20 09:26:41 - Shell(51) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:41 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:42 - Shell(52) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=506'; . 2019.11.20 09:26:42 - Shell(52) done in 124 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:42 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:42 - Shell(53) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="14" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=266'; . 2019.11.20 09:26:42 - Shell(53) done in 125 ms, exit: 1, out: 'The object already exists.' W 2019.11.20 09:26:42 - Routes, add ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: The object already exists . 2019.11.20 09:26:42 - Shell(54) of 'cmd.exe', 2 args: '/c';'route delete 91.214.169.69 mask 255.255.255.255 10.20.2.1 if 28'; . 2019.11.20 09:26:42 - Shell(54) done in 63 ms, exit: 0, err: 'The route deletion failed: Element not found.' . 2019.11.20 09:26:42 - Routes, remove 91.214.169.69 for gateway 10.20.2.1 failed: The route deletion failed: Element not found ! 2019.11.20 09:26:42 - Activation of Network Lock - Windows Filtering Platform . 2019.11.20 09:26:42 - Updating systems & servers data ... I 2019.11.20 09:26:43 - Session starting. . 2019.11.20 09:26:43 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:26:43 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:26:44 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:26:44 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) W 2019.11.20 09:26:44 - The option 'Remove default gateway' will be deprecated soon. . 2019.11.20 09:26:44 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) I 2019.11.20 09:26:45 - Checking authorization ... . 2019.11.20 09:26:45 - Checking authorization ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:26:45 - Checking authorization ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:26:45 - Checking authorization ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:26:45 - Checking authorization ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) W 2019.11.20 09:26:45 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:26:45 - IPv6 disabled with packet filtering. ! 2019.11.20 09:26:45 - Connecting to Kitalpha (Switzerland, Zurich) . 2019.11.20 09:26:46 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 09:26:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 09:26:46 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 09:26:46 - Connection to OpenVPN Management Interface . 2019.11.20 09:26:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 09:26:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 09:26:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 09:26:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 09:26:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 09:26:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.214.169.71:443 . 2019.11.20 09:26:47 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 09:26:47 - OpenVPN > UDP link local: (not bound) . 2019.11.20 09:26:47 - OpenVPN > UDP link remote: [AF_INET]91.214.169.71:443 . 2019.11.20 09:26:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 09:27:19 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.11.20 09:27:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.11.20 09:27:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.11.20 09:27:24 - Disconnecting . 2019.11.20 09:27:24 - Connection terminated. . 2019.11.20 09:27:24 - IPv6 restored with packet filtering. I 2019.11.20 09:27:27 - Checking authorization ... . 2019.11.20 09:27:28 - IPv6 disabled with packet filtering. ! 2019.11.20 09:27:28 - Connecting to Kitalpha (Switzerland, Zurich) . 2019.11.20 09:27:28 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 09:27:28 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 09:27:28 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 09:27:28 - Connection to OpenVPN Management Interface . 2019.11.20 09:27:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 09:27:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 09:27:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 09:27:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 09:27:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 09:27:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.214.169.71:443 . 2019.11.20 09:27:28 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 09:27:28 - OpenVPN > UDP link local: (not bound) . 2019.11.20 09:27:28 - OpenVPN > UDP link remote: [AF_INET]91.214.169.71:443 . 2019.11.20 09:27:28 - OpenVPN > TLS: Initial packet from [AF_INET]91.214.169.71:443, sid=4815262e 91ee9d12 . 2019.11.20 09:27:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 09:27:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 09:27:28 - OpenVPN > VERIFY KU OK . 2019.11.20 09:27:28 - OpenVPN > Validating certificate extended key usage . 2019.11.20 09:27:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 09:27:28 - OpenVPN > VERIFY EKU OK . 2019.11.20 09:27:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2019.11.20 09:27:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 09:27:28 - OpenVPN > [Kitalpha] Peer Connection Initiated with [AF_INET]91.214.169.71:443 . 2019.11.20 09:27:29 - OpenVPN > SENT CONTROL [Kitalpha]: 'PUSH_REQUEST' (status=1) . 2019.11.20 09:27:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.2.1,route-gateway 10.20.2.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.2.164 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2019.11.20 09:27:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 09:27:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 09:27:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 09:27:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 09:27:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 09:27:29 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 09:27:29 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 09:27:29 - OpenVPN > open_tun . 2019.11.20 09:27:30 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 09:27:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 09:27:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.2.0/10.20.2.164/255.255.255.0 [SUCCEEDED] . 2019.11.20 09:27:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.2.164/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.20.2.254, lease-time: 31536000] . 2019.11.20 09:27:30 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 09:27:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2019.11.20 09:27:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.11.20 09:27:35 - OpenVPN > C:\Windows\system32\route.exe ADD 91.214.169.71 MASK 255.255.255.255 192.168.178.1 . 2019.11.20 09:27:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2019.11.20 09:27:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.11.20 09:27:35 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.2.1 . 2019.11.20 09:27:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2019.11.20 09:27:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.11.20 09:27:35 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.2.1 . 2019.11.20 09:27:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2019.11.20 09:27:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.11.20 09:27:35 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4 . 2019.11.20 09:27:35 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv6 . 2019.11.20 09:27:35 - DNS leak protection with packet filtering enabled. . 2019.11.20 09:27:35 - Shell(55) of 'cmd.exe', 2 args: '/c';'route -4 PRINT'; . 2019.11.20 09:27:35 - Shell(55) done in 218 ms, exit: 0, out: '=========================================================================== . 2019.11.20 09:27:35 - Interface List . 2019.11.20 09:27:35 - 28...00 ff 61 ac a0 b8 ......TAP-Windows Adapter V9 . 2019.11.20 09:27:35 - 20...02 00 4c 4f 4f 50 ......Npcap Loopback Adapter . 2019.11.20 09:27:35 - 14...74 d0 2b c6 9c 18 ......Realtek PCIe GBE Family Controller . 2019.11.20 09:27:35 - 13...74 d0 2b c6 99 df ......Intel(R) Ethernet Connection I217-V . 2019.11.20 09:27:35 - 18...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1 . 2019.11.20 09:27:35 - 19...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8 . 2019.11.20 09:27:35 - 1...........................Software Loopback Interface 1 . 2019.11.20 09:27:35 - 22...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter . 2019.11.20 09:27:35 - 21...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2 . 2019.11.20 09:27:35 - 23...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3 . 2019.11.20 09:27:35 - 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4 . 2019.11.20 09:27:35 - 25...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5 . 2019.11.20 09:27:35 - 24...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6 . 2019.11.20 09:27:35 - 26...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7 . 2019.11.20 09:27:35 - 27...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #8 . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - IPv4 Route Table . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - Active Routes: . 2019.11.20 09:27:35 - Network Destination Netmask Gateway Interface Metric . 2019.11.20 09:27:35 - 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.24 10 . 2019.11.20 09:27:35 - 0.0.0.0 128.0.0.0 10.20.2.1 10.20.2.164 3 . 2019.11.20 09:27:35 - 10.20.2.0 255.255.255.0 On-link 10.20.2.164 259 . 2019.11.20 09:27:35 - 10.20.2.164 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:27:35 - 10.20.2.255 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:27:35 - 91.214.169.71 255.255.255.255 192.168.178.1 192.168.178.24 10 . 2019.11.20 09:27:35 - 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306 . 2019.11.20 09:27:35 - 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:27:35 - 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:27:35 - 128.0.0.0 128.0.0.0 10.20.2.1 10.20.2.164 3 . 2019.11.20 09:27:35 - 169.254.0.0 255.255.0.0 On-link 169.254.231.154 286 . 2019.11.20 09:27:35 - 169.254.0.0 255.255.0.0 On-link 169.254.140.46 276 . 2019.11.20 09:27:35 - 169.254.140.46 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:27:35 - 169.254.231.154 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:27:35 - 169.254.255.255 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:27:35 - 169.254.255.255 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:27:35 - 192.168.178.0 255.255.255.0 On-link 192.168.178.24 266 . 2019.11.20 09:27:35 - 192.168.178.24 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:27:35 - 192.168.178.255 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:27:35 - 192.168.230.0 255.255.255.0 On-link 192.168.230.1 276 . 2019.11.20 09:27:35 - 192.168.230.1 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:27:35 - 192.168.230.255 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 192.168.178.24 266 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 192.168.230.1 276 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 169.254.140.46 276 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 10.20.2.164 259 . 2019.11.20 09:27:35 - 224.0.0.0 240.0.0.0 On-link 169.254.231.154 286 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:27:35 - 255.255.255.255 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - Persistent Routes: . 2019.11.20 09:27:35 - None' . 2019.11.20 09:27:35 - Shell(56) of 'cmd.exe', 2 args: '/c';'route -6 PRINT'; . 2019.11.20 09:27:35 - Shell(56) done in 78 ms, exit: 0, out: '=========================================================================== . 2019.11.20 09:27:35 - Interface List . 2019.11.20 09:27:35 - 28...00 ff 61 ac a0 b8 ......TAP-Windows Adapter V9 . 2019.11.20 09:27:35 - 20...02 00 4c 4f 4f 50 ......Npcap Loopback Adapter . 2019.11.20 09:27:35 - 14...74 d0 2b c6 9c 18 ......Realtek PCIe GBE Family Controller . 2019.11.20 09:27:35 - 13...74 d0 2b c6 99 df ......Intel(R) Ethernet Connection I217-V . 2019.11.20 09:27:35 - 18...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1 . 2019.11.20 09:27:35 - 19...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8 . 2019.11.20 09:27:35 - 1...........................Software Loopback Interface 1 . 2019.11.20 09:27:35 - 22...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter . 2019.11.20 09:27:35 - 21...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2 . 2019.11.20 09:27:35 - 23...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3 . 2019.11.20 09:27:35 - 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4 . 2019.11.20 09:27:35 - 25...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5 . 2019.11.20 09:27:35 - 24...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6 . 2019.11.20 09:27:35 - 26...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7 . 2019.11.20 09:27:35 - 27...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #8 . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - IPv6 Route Table . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - Active Routes: . 2019.11.20 09:27:35 - If Metric Network Destination Gateway . 2019.11.20 09:27:35 - 13 516 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:27:35 - 1 306 ::1/128 On-link . 2019.11.20 09:27:35 - 13 266 2001:983:4509::/48 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:27:35 - 13 18 2001:983:4509:1::/64 On-link . 2019.11.20 09:27:35 - 13 266 2001:983:4509:1:61:2f43:51be:efc0/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 13 266 2001:983:4509:1:212a:b881:1c:a87a/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 13 266 fe80::/64 On-link . 2019.11.20 09:27:35 - 19 276 fe80::/64 On-link . 2019.11.20 09:27:35 - 18 276 fe80::/64 On-link . 2019.11.20 09:27:35 - 28 259 fe80::/64 On-link . 2019.11.20 09:27:35 - 20 286 fe80::/64 On-link . 2019.11.20 09:27:35 - 13 266 fe80::212a:b881:1c:a87a/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 20 286 fe80::79c5:ba4c:5b8c:e79a/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 28 259 fe80::8524:60fc:a223:38d1/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 19 276 fe80::cd58:27c9:8f80:21a3/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 18 276 fe80::dd95:5971:7224:8c2e/128 . 2019.11.20 09:27:35 - On-link . 2019.11.20 09:27:35 - 1 306 ff00::/8 On-link . 2019.11.20 09:27:35 - 13 266 ff00::/8 On-link . 2019.11.20 09:27:35 - 19 276 ff00::/8 On-link . 2019.11.20 09:27:35 - 18 276 ff00::/8 On-link . 2019.11.20 09:27:35 - 28 259 ff00::/8 On-link . 2019.11.20 09:27:35 - 20 286 ff00::/8 On-link . 2019.11.20 09:27:35 - =========================================================================== . 2019.11.20 09:27:35 - Persistent Routes: . 2019.11.20 09:27:35 - If Metric Network Destination Gateway . 2019.11.20 09:27:35 - 0 4294967295 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 . 2019.11.20 09:27:35 - fde6:7a:7d20:2c0::1 . 2019.11.20 09:27:35 - 0 4294967295 2a02:29b8:dc01:1859:13d0:9e6d:32a2:625e/128 . 2019.11.20 09:27:35 - fde6:7a:7d20:1c20::1 . 2019.11.20 09:27:35 - 0 4294967295 2001:ac8:28:3:4a30:c1b3:8485:40c/128 . 2019.11.20 09:27:35 - fde6:7a:7d20:80::1 . 2019.11.20 09:27:35 - 0 506 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:27:35 - 0 266 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:27:35 - ===========================================================================' . 2019.11.20 09:27:35 - Shell(57) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Local Area Connection 3" source=static address=10.20.2.1 register=primary validate=no'; . 2019.11.20 09:29:35 - Shell(57) done in 119730 ms, exit: 1, out: 'The service did not respond to the start or control request in a timely fashion.' . 2019.11.20 09:29:35 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from automatic to 10.20.2.1) . 2019.11.20 09:29:35 - Shell(58) of 'cmd.exe', 2 args: '/c';'route -4 PRINT'; . 2019.11.20 09:29:35 - Shell(58) done in 188 ms, exit: 0, out: '=========================================================================== . 2019.11.20 09:29:35 - Interface List . 2019.11.20 09:29:35 - 28...00 ff 61 ac a0 b8 ......TAP-Windows Adapter V9 . 2019.11.20 09:29:35 - 20...02 00 4c 4f 4f 50 ......Npcap Loopback Adapter . 2019.11.20 09:29:35 - 14...74 d0 2b c6 9c 18 ......Realtek PCIe GBE Family Controller . 2019.11.20 09:29:35 - 13...74 d0 2b c6 99 df ......Intel(R) Ethernet Connection I217-V . 2019.11.20 09:29:35 - 18...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1 . 2019.11.20 09:29:35 - 19...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8 . 2019.11.20 09:29:35 - 1...........................Software Loopback Interface 1 . 2019.11.20 09:29:35 - 22...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter . 2019.11.20 09:29:35 - 21...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2 . 2019.11.20 09:29:35 - 23...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3 . 2019.11.20 09:29:35 - 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4 . 2019.11.20 09:29:35 - 25...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5 . 2019.11.20 09:29:35 - 24...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6 . 2019.11.20 09:29:35 - 26...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7 . 2019.11.20 09:29:35 - 27...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #8 . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - IPv4 Route Table . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - Active Routes: . 2019.11.20 09:29:35 - Network Destination Netmask Gateway Interface Metric . 2019.11.20 09:29:35 - 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.24 10 . 2019.11.20 09:29:35 - 0.0.0.0 128.0.0.0 10.20.2.1 10.20.2.164 3 . 2019.11.20 09:29:35 - 10.20.2.0 255.255.255.0 On-link 10.20.2.164 259 . 2019.11.20 09:29:35 - 10.20.2.164 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:29:35 - 10.20.2.255 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:29:35 - 91.214.169.71 255.255.255.255 192.168.178.1 192.168.178.24 10 . 2019.11.20 09:29:35 - 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306 . 2019.11.20 09:29:35 - 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:29:35 - 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:29:35 - 128.0.0.0 128.0.0.0 10.20.2.1 10.20.2.164 3 . 2019.11.20 09:29:35 - 169.254.0.0 255.255.0.0 On-link 169.254.231.154 286 . 2019.11.20 09:29:35 - 169.254.0.0 255.255.0.0 On-link 169.254.140.46 276 . 2019.11.20 09:29:35 - 169.254.140.46 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:29:35 - 169.254.231.154 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:29:35 - 169.254.255.255 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:29:35 - 169.254.255.255 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:29:35 - 192.168.178.0 255.255.255.0 On-link 192.168.178.24 266 . 2019.11.20 09:29:35 - 192.168.178.24 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:29:35 - 192.168.178.255 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:29:35 - 192.168.230.0 255.255.255.0 On-link 192.168.230.1 276 . 2019.11.20 09:29:35 - 192.168.230.1 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:29:35 - 192.168.230.255 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 192.168.178.24 266 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 192.168.230.1 276 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 169.254.140.46 276 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 10.20.2.164 259 . 2019.11.20 09:29:35 - 224.0.0.0 240.0.0.0 On-link 169.254.231.154 286 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 192.168.178.24 266 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 192.168.230.1 276 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 169.254.140.46 276 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 10.20.2.164 259 . 2019.11.20 09:29:35 - 255.255.255.255 255.255.255.255 On-link 169.254.231.154 286 . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - Persistent Routes: . 2019.11.20 09:29:35 - None' . 2019.11.20 09:29:35 - Shell(59) of 'cmd.exe', 2 args: '/c';'route -6 PRINT'; . 2019.11.20 09:29:35 - Shell(59) done in 93 ms, exit: 0, out: '=========================================================================== . 2019.11.20 09:29:35 - Interface List . 2019.11.20 09:29:35 - 28...00 ff 61 ac a0 b8 ......TAP-Windows Adapter V9 . 2019.11.20 09:29:35 - 20...02 00 4c 4f 4f 50 ......Npcap Loopback Adapter . 2019.11.20 09:29:35 - 14...74 d0 2b c6 9c 18 ......Realtek PCIe GBE Family Controller . 2019.11.20 09:29:35 - 13...74 d0 2b c6 99 df ......Intel(R) Ethernet Connection I217-V . 2019.11.20 09:29:35 - 18...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1 . 2019.11.20 09:29:35 - 19...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8 . 2019.11.20 09:29:35 - 1...........................Software Loopback Interface 1 . 2019.11.20 09:29:35 - 22...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter . 2019.11.20 09:29:35 - 21...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2 . 2019.11.20 09:29:35 - 23...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3 . 2019.11.20 09:29:35 - 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4 . 2019.11.20 09:29:35 - 25...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5 . 2019.11.20 09:29:35 - 24...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6 . 2019.11.20 09:29:35 - 26...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7 . 2019.11.20 09:29:35 - 27...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #8 . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - IPv6 Route Table . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - Active Routes: . 2019.11.20 09:29:35 - If Metric Network Destination Gateway . 2019.11.20 09:29:35 - 13 516 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:35 - 1 306 ::1/128 On-link . 2019.11.20 09:29:35 - 13 266 2001:983:4509::/48 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:35 - 13 18 2001:983:4509:1::/64 On-link . 2019.11.20 09:29:35 - 13 266 2001:983:4509:1:61:2f43:51be:efc0/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 13 266 2001:983:4509:1:212a:b881:1c:a87a/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 13 266 fe80::/64 On-link . 2019.11.20 09:29:35 - 19 276 fe80::/64 On-link . 2019.11.20 09:29:35 - 18 276 fe80::/64 On-link . 2019.11.20 09:29:35 - 28 259 fe80::/64 On-link . 2019.11.20 09:29:35 - 20 286 fe80::/64 On-link . 2019.11.20 09:29:35 - 13 266 fe80::212a:b881:1c:a87a/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 20 286 fe80::79c5:ba4c:5b8c:e79a/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 28 259 fe80::8524:60fc:a223:38d1/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 19 276 fe80::cd58:27c9:8f80:21a3/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 18 276 fe80::dd95:5971:7224:8c2e/128 . 2019.11.20 09:29:35 - On-link . 2019.11.20 09:29:35 - 1 306 ff00::/8 On-link . 2019.11.20 09:29:35 - 13 266 ff00::/8 On-link . 2019.11.20 09:29:35 - 19 276 ff00::/8 On-link . 2019.11.20 09:29:35 - 18 276 ff00::/8 On-link . 2019.11.20 09:29:35 - 28 259 ff00::/8 On-link . 2019.11.20 09:29:35 - 20 286 ff00::/8 On-link . 2019.11.20 09:29:35 - =========================================================================== . 2019.11.20 09:29:35 - Persistent Routes: . 2019.11.20 09:29:35 - If Metric Network Destination Gateway . 2019.11.20 09:29:35 - 0 4294967295 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 . 2019.11.20 09:29:35 - fde6:7a:7d20:2c0::1 . 2019.11.20 09:29:35 - 0 4294967295 2a02:29b8:dc01:1859:13d0:9e6d:32a2:625e/128 . 2019.11.20 09:29:35 - fde6:7a:7d20:1c20::1 . 2019.11.20 09:29:35 - 0 4294967295 2001:ac8:28:3:4a30:c1b3:8485:40c/128 . 2019.11.20 09:29:35 - fde6:7a:7d20:80::1 . 2019.11.20 09:29:35 - 0 506 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:35 - 0 266 ::/0 fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:35 - ===========================================================================' . 2019.11.20 09:29:36 - Shell(60) of 'cmd.exe', 2 args: '/c';'route delete 0.0.0.0 mask 0.0.0.0 192.168.178.1 if 13'; . 2019.11.20 09:29:36 - Shell(60) done in 78 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:36 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.178.1 . 2019.11.20 09:29:36 - Shell(61) of 'cmd.exe', 2 args: '/c';'route delete 0.0.0.0 mask 128.0.0.0 10.20.2.1 if 28'; . 2019.11.20 09:29:36 - Shell(61) done in 62 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:36 - Routes, removed an existing route, 0.0.0.0/1 for gateway 10.20.2.1 . 2019.11.20 09:29:36 - Shell(62) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 del route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217"'; . 2019.11.20 09:29:39 - Shell(62) done in 2948 ms, exit: 0, out: 'Ok.' . 2019.11.20 09:29:39 - Routes, removed an existing route, ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 09:29:39 - Routes, remove ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 failed: Network interface no more available. . 2019.11.20 09:29:39 - Above log line repeated 1 times more . 2019.11.20 09:29:39 - Shell(63) of 'cmd.exe', 2 args: '/c';'route add 91.214.169.69 mask 255.255.255.255 10.20.2.1 if 28'; . 2019.11.20 09:29:39 - Shell(63) done in 62 ms, exit: 0, out: 'OK!' . 2019.11.20 09:29:39 - Routes, added a new route, 91.214.169.69 for gateway 10.20.2.1 . 2019.11.20 09:29:39 - Flushing DNS . 2019.11.20 09:29:39 - Shell(64) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns'; . 2019.11.20 09:31:34 - Shell(64) done in 115066 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 09:31:34 - Successfully flushed the DNS Resolver Cache.' . 2019.11.20 09:31:34 - Shell(65) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns'; . 2019.11.20 09:31:41 - Shell(65) done in 6100 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 09:31:41 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.' I 2019.11.20 09:31:41 - Checking route IPv4 I 2019.11.20 09:31:41 - Checking DNS ! 2019.11.20 09:33:11 - Connected. . 2019.11.20 09:33:12 - OpenVPN > Initialization Sequence Completed . 2019.11.20 09:36:44 - Updating systems & servers data ... . 2019.11.20 09:36:44 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:36:44 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 09:36:44 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:46:44 - Updating systems & servers data ... . 2019.11.20 09:46:44 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:46:44 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:46:44 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:46:44 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 09:46:44 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:57:44 - Updating systems & servers data ... . 2019.11.20 09:57:45 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 09:57:45 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 09:57:45 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 09:57:45 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 09:57:45 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:08:45 - Updating systems & servers data ... . 2019.11.20 10:08:45 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:08:45 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 10:08:45 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 10:08:45 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 10:08:45 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:18:45 - Updating systems & servers data ... . 2019.11.20 10:18:45 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:18:45 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 10:18:45 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 10:18:45 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 10:18:45 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:27:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 10:27:28 - OpenVPN > VERIFY KU OK . 2019.11.20 10:27:28 - OpenVPN > Validating certificate extended key usage . 2019.11.20 10:27:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 10:27:28 - OpenVPN > VERIFY EKU OK . 2019.11.20 10:27:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2019.11.20 10:27:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 10:27:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 10:27:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 10:29:45 - Updating systems & servers data ... . 2019.11.20 10:29:45 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:29:45 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 10:29:45 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 10:29:46 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 10:29:46 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:40:46 - Updating systems & servers data ... . 2019.11.20 10:40:46 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:40:46 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 10:40:46 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 10:40:46 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 10:40:46 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:50:50 - Updating systems & servers data ... . 2019.11.20 10:50:50 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 10:50:50 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 10:50:50 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 10:50:50 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 10:50:50 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:01:45 - Updating systems & servers data ... . 2019.11.20 11:01:45 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:01:45 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 11:01:45 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 11:01:45 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 11:01:47 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:12:42 - Updating systems & servers data ... . 2019.11.20 11:12:42 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:12:42 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 11:12:42 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 11:12:42 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 11:12:42 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:23:37 - Updating systems & servers data ... . 2019.11.20 11:23:37 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:23:37 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 11:23:37 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 11:23:37 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 11:23:37 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:27:28 - Renewing TLS key . 2019.11.20 11:27:28 - OpenVPN > TLS: tls_process: killed expiring key . 2019.11.20 11:27:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:27:29 - OpenVPN > VERIFY KU OK . 2019.11.20 11:27:29 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:27:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:27:29 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:27:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2019.11.20 11:27:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:27:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:27:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:34:33 - Updating systems & servers data ... . 2019.11.20 11:34:33 - Updating systems & servers data ..., 1° try failed (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:34:33 - Updating systems & servers data ..., 2° try failed (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable) . 2019.11.20 11:34:33 - Updating systems & servers data ..., 3° try failed (curl: (7) Failed to connect to 54.93.175.114 port 80: Network unreachable) . 2019.11.20 11:34:33 - Updating systems & servers data ..., 4° try failed (curl: (7) Failed to connect to 63.33.116.50 port 80: Network unreachable) . 2019.11.20 11:34:33 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 63.33.78.166 port 80: Network unreachable) . 2019.11.20 11:40:56 - OpenVPN > [Kitalpha] Inactivity timeout (--ping-restart), restarting . 2019.11.20 11:40:56 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.11.20 11:40:56 - OpenVPN > Restart pause, 5 second(s) ! 2019.11.20 11:40:56 - Disconnecting . 2019.11.20 11:40:56 - Shell(66) of 'cmd.exe', 2 args: '/c';'route delete 91.214.169.69 mask 255.255.255.255 10.20.2.1 if 28'; . 2019.11.20 11:40:56 - Shell(66) done in 78 ms, exit: 0, out: 'OK!' . 2019.11.20 11:40:56 - Routes, removed a route previously added, 91.214.169.69 for gateway 10.20.2.1 . 2019.11.20 11:40:56 - Sending management termination signal . 2019.11.20 11:40:56 - Management - Send 'signal SIGTERM' . 2019.11.20 11:40:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.11.20 11:40:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 91.214.169.71 MASK 255.255.255.255 192.168.178.1 . 2019.11.20 11:40:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.11.20 11:40:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.2.1 . 2019.11.20 11:40:56 - OpenVPN > ROUTE: route deletion failed using DeleteIpForwardEntry: Element not found. . 2019.11.20 11:40:56 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2019.11.20 11:40:56 - OpenVPN > Route deletion fallback to route.exe . 2019.11.20 11:40:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2019.11.20 11:40:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.2.1 . 2019.11.20 11:40:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.11.20 11:40:56 - OpenVPN > Closing TUN/TAP interface . 2019.11.20 11:40:57 - OpenVPN > TAP: DHCP address released . 2019.11.20 11:40:57 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2019.11.20 11:40:57 - Connection terminated. . 2019.11.20 11:40:57 - IPv6 restored with packet filtering. . 2019.11.20 11:40:58 - Shell(67) of 'cmd.exe', 2 args: '/c';'route add 0.0.0.0 mask 0.0.0.0 192.168.178.1 if 13'; . 2019.11.20 11:40:58 - Shell(67) done in 78 ms, exit: 0, out: 'OK!' . 2019.11.20 11:40:58 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.178.1 . 2019.11.20 11:40:58 - Shell(68) of 'cmd.exe', 2 args: '/c';'route add 0.0.0.0 mask 128.0.0.0 10.20.2.1 if 28'; . 2019.11.20 11:40:58 - Shell(68) done in 78 ms, exit: 0, out: 'OK!' . 2019.11.20 11:40:58 - Routes, restored a previously deleted route, 0.0.0.0/1 for gateway 10.20.2.1 . 2019.11.20 11:40:58 - Shell(69) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="::/0" interface="13" nexthop="fe80::9ec7:a6ff:fecd:c217" metric=516'; . 2019.11.20 11:41:01 - Shell(69) done in 2980 ms, exit: 0, out: 'Ok.' . 2019.11.20 11:41:01 - Routes, restored a previously deleted route, ::/0 for gateway fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:41:01 - Shell(70) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Local Area Connection 3" source=dhcp register=primary validate=no'; . 2019.11.20 11:41:31 - Shell(70) done in 30171 ms, exit: 1, out: 'The service did not respond to the start or control request in a timely fashion.' . 2019.11.20 11:41:31 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 3, to automatic) . 2019.11.20 11:41:31 - DNS leak protection with packet filtering disabled. . 2019.11.20 11:41:31 - Interface Local Area Connection 3 metric restored from 3 to Automatic, layer IPv4 . 2019.11.20 11:41:31 - Interface Local Area Connection 3 metric restored from 3 to Automatic, layer IPv6 I 2019.11.20 11:41:39 - Checking authorization ... ! 2019.11.20 11:41:39 - Connecting to Lesath (Canada, Toronto, Ontario) . 2019.11.20 11:41:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:41:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:41:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:41:40 - Connection to OpenVPN Management Interface . 2019.11.20 11:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:41:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:41:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:41:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:41:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:41:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2019.11.20 11:41:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:41:40 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:41:40 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443 . 2019.11.20 11:41:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=3cb478cb fe98c466 . 2019.11.20 11:41:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:41:40 - OpenVPN > VERIFY KU OK . 2019.11.20 11:41:40 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:41:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:41:40 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:41:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2019.11.20 11:41:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:41:40 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2019.11.20 11:41:41 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:41:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.226.1,dhcp-option DNS6 fde6:7a:7d20:10e2::1,tun-ipv6,route-gateway 10.20.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10e2::103b/64 fde6:7a:7d20:10e2::1,ifconfig 10.20.226.61 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.11.20 11:41:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:41:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:41:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:41:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:41:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:41:41 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:41:41 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:41:41 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:41:41 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:41:41 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:41:41 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:41:41 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:41:41 - OpenVPN > open_tun . 2019.11.20 11:41:42 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:41:42 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:41:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.226.0/10.20.226.61/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:41:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.226.61/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.20.226.254, lease-time: 31536000] . 2019.11.20 11:41:42 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:41:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:41:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:10e2::103b store=active . 2019.11.20 11:41:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:10e2::1 validate=no E 2019.11.20 11:42:42 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:42:46 - OpenVPN > NETSH: command failed . 2019.11.20 11:42:46 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:42:46 - Disconnecting . 2019.11.20 11:42:46 - Connection terminated. I 2019.11.20 11:42:49 - Checking authorization ... ! 2019.11.20 11:42:49 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2019.11.20 11:42:49 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:42:49 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:42:49 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:42:49 - Connection to OpenVPN Management Interface . 2019.11.20 11:42:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:42:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:42:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:42:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:42:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:42:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2019.11.20 11:42:49 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:42:49 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:42:49 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443 . 2019.11.20 11:42:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:42:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=4d8c07c9 7871e965 . 2019.11.20 11:42:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:42:49 - OpenVPN > VERIFY KU OK . 2019.11.20 11:42:49 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:42:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:42:49 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:42:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2019.11.20 11:42:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:42:50 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 . 2019.11.20 11:42:51 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:42:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.194.1,dhcp-option DNS6 fde6:7a:7d20:2c2::1,tun-ipv6,route-gateway 10.6.194.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2c2::101d/64 fde6:7a:7d20:2c2::1,ifconfig 10.6.194.31 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.11.20 11:42:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:42:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:42:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:42:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:42:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:42:51 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:42:51 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:42:51 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:42:51 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:42:51 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:42:51 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:42:51 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:42:51 - OpenVPN > open_tun . 2019.11.20 11:42:51 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:42:51 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:42:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.194.0/10.6.194.31/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:42:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.194.31/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.6.194.254, lease-time: 31536000] . 2019.11.20 11:42:51 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:42:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:42:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:2c2::101d store=active . 2019.11.20 11:42:53 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:2c2::1 validate=no E 2019.11.20 11:43:59 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:44:03 - OpenVPN > NETSH: command failed . 2019.11.20 11:44:03 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:44:03 - Disconnecting . 2019.11.20 11:44:03 - Connection terminated. I 2019.11.20 11:44:06 - Checking authorization ... ! 2019.11.20 11:44:07 - Connecting to Virginis (Switzerland, Bern) . 2019.11.20 11:44:07 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:44:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:44:07 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:44:07 - Connection to OpenVPN Management Interface . 2019.11.20 11:44:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:44:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:44:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:44:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:44:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:44:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.19.137.117:443 . 2019.11.20 11:44:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:44:07 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:44:07 - OpenVPN > UDP link remote: [AF_INET]46.19.137.117:443 . 2019.11.20 11:44:07 - OpenVPN > TLS: Initial packet from [AF_INET]46.19.137.117:443, sid=fc535831 908c0c22 . 2019.11.20 11:44:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:44:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:44:07 - OpenVPN > VERIFY KU OK . 2019.11.20 11:44:07 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:44:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:44:07 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:44:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Virginis, emailAddress=info@airvpn.org . 2019.11.20 11:44:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:44:07 - OpenVPN > [Virginis] Peer Connection Initiated with [AF_INET]46.19.137.117:443 . 2019.11.20 11:44:08 - OpenVPN > SENT CONTROL [Virginis]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:44:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.34.1,dhcp-option DNS6 fde6:7a:7d20:1c22::1,tun-ipv6,route-gateway 10.32.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c22::10a9/64 fde6:7a:7d20:1c22::1,ifconfig 10.32.34.171 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.11.20 11:44:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:44:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:44:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:44:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:44:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:44:08 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:44:08 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:44:08 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:44:08 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:44:08 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:44:08 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:44:08 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:44:08 - OpenVPN > open_tun . 2019.11.20 11:44:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:44:09 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:44:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.34.0/10.32.34.171/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:44:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.34.171/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.32.34.254, lease-time: 31536000] . 2019.11.20 11:44:09 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:44:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:44:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:1c22::10a9 store=active . 2019.11.20 11:44:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:1c22::1 validate=no . 2019.11.20 11:45:28 - Updating systems & servers data ... . 2019.11.20 11:45:29 - Systems & servers data update completed E 2019.11.20 11:45:29 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:45:33 - OpenVPN > NETSH: command failed . 2019.11.20 11:45:33 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:45:33 - Disconnecting . 2019.11.20 11:45:33 - Connection terminated. I 2019.11.20 11:45:39 - Checking authorization ... ! 2019.11.20 11:45:39 - Connecting to Tucana (Germany, Frankfurt) . 2019.11.20 11:45:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:45:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:45:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:45:40 - Connection to OpenVPN Management Interface . 2019.11.20 11:45:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:45:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:45:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:45:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:45:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:45:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.212.216:443 . 2019.11.20 11:45:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:45:40 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:45:40 - OpenVPN > UDP link remote: [AF_INET]178.162.212.216:443 . 2019.11.20 11:45:40 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.212.216:443, sid=d1292047 d5447891 . 2019.11.20 11:45:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:45:40 - OpenVPN > VERIFY KU OK . 2019.11.20 11:45:40 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:45:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:45:40 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:45:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tucana, emailAddress=info@airvpn.org . 2019.11.20 11:45:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:45:40 - OpenVPN > [Tucana] Peer Connection Initiated with [AF_INET]178.162.212.216:443 . 2019.11.20 11:45:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:45:40 - OpenVPN > SENT CONTROL [Tucana]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:45:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.194.1,dhcp-option DNS6 fde6:7a:7d20:9c2::1,tun-ipv6,route-gateway 10.13.194.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9c2::101b/64 fde6:7a:7d20:9c2::1,ifconfig 10.13.194.29 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.11.20 11:45:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:45:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:45:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:45:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:45:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:45:40 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:45:40 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:45:40 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:45:40 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:45:40 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:45:40 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:45:40 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:45:40 - OpenVPN > open_tun . 2019.11.20 11:45:40 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:45:40 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:45:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.13.194.0/10.13.194.29/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:45:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.13.194.29/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.13.194.254, lease-time: 31536000] . 2019.11.20 11:45:40 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:45:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:45:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:9c2::101b store=active . 2019.11.20 11:45:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:9c2::1 validate=no E 2019.11.20 11:46:59 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:47:04 - OpenVPN > NETSH: command failed . 2019.11.20 11:47:04 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:47:04 - Disconnecting . 2019.11.20 11:47:04 - Connection terminated. I 2019.11.20 11:47:07 - Checking authorization ... ! 2019.11.20 11:47:07 - Connecting to Sirrah (Switzerland, Zurich) . 2019.11.20 11:47:07 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:47:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:47:07 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:47:07 - Connection to OpenVPN Management Interface . 2019.11.20 11:47:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:47:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:47:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:47:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:47:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:47:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.61:443 . 2019.11.20 11:47:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:47:07 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:47:07 - OpenVPN > UDP link remote: [AF_INET]185.156.175.61:443 . 2019.11.20 11:47:07 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.61:443, sid=6bd6257b b4d48ada . 2019.11.20 11:47:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:47:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:47:07 - OpenVPN > VERIFY KU OK . 2019.11.20 11:47:07 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:47:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:47:07 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:47:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org . 2019.11.20 11:47:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:47:07 - OpenVPN > [Sirrah] Peer Connection Initiated with [AF_INET]185.156.175.61:443 . 2019.11.20 11:47:09 - OpenVPN > SENT CONTROL [Sirrah]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:47:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.66.1,dhcp-option DNS6 fde6:7a:7d20:1a42::1,tun-ipv6,route-gateway 10.30.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a42::1092/64 fde6:7a:7d20:1a42::1,ifconfig 10.30.66.148 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.11.20 11:47:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:47:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:47:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:47:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:47:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:47:09 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:47:09 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:47:09 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:47:09 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:47:09 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:47:09 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:47:09 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:47:09 - OpenVPN > open_tun . 2019.11.20 11:47:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:47:09 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:47:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.66.0/10.30.66.148/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:47:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.66.148/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.30.66.254, lease-time: 31536000] . 2019.11.20 11:47:09 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:47:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:47:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:1a42::1092 store=active . 2019.11.20 11:47:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:1a42::1 validate=no E 2019.11.20 11:48:20 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:48:24 - OpenVPN > NETSH: command failed . 2019.11.20 11:48:24 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:48:24 - Disconnecting . 2019.11.20 11:48:24 - Connection terminated. I 2019.11.20 11:48:27 - Checking authorization ... ! 2019.11.20 11:48:27 - Connecting to Hamal (Switzerland, Zurich) . 2019.11.20 11:48:27 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:48:27 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:48:27 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:48:27 - Connection to OpenVPN Management Interface . 2019.11.20 11:48:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:48:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:48:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:48:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:48:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:48:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.45:443 . 2019.11.20 11:48:27 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:48:27 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:48:27 - OpenVPN > UDP link remote: [AF_INET]185.156.175.45:443 . 2019.11.20 11:48:27 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.45:443, sid=58e07da1 bb6da643 . 2019.11.20 11:48:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:48:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:48:27 - OpenVPN > VERIFY KU OK . 2019.11.20 11:48:27 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:48:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:48:27 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:48:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2019.11.20 11:48:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:48:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.156.175.45:443 . 2019.11.20 11:48:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:48:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.98.1,dhcp-option DNS6 fde6:7a:7d20:e62::1,tun-ipv6,route-gateway 10.18.98.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e62::1096/64 fde6:7a:7d20:e62::1,ifconfig 10.18.98.152 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2019.11.20 11:48:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:48:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:48:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:48:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:48:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:48:29 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:48:29 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:48:29 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:48:29 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:48:29 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:48:29 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:48:29 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:48:29 - OpenVPN > open_tun . 2019.11.20 11:48:29 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:48:29 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:48:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.98.0/10.18.98.152/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:48:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.98.152/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.18.98.254, lease-time: 31536000] . 2019.11.20 11:48:29 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:48:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:48:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:e62::1096 store=active . 2019.11.20 11:48:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:e62::1 validate=no E 2019.11.20 11:49:50 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:49:54 - OpenVPN > NETSH: command failed . 2019.11.20 11:49:54 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:49:54 - Disconnecting . 2019.11.20 11:49:54 - Connection terminated. I 2019.11.20 11:49:57 - Checking authorization ... ! 2019.11.20 11:49:57 - Connecting to Achernar (Switzerland, Zurich) . 2019.11.20 11:49:57 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:49:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:49:57 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:49:57 - Connection to OpenVPN Management Interface . 2019.11.20 11:49:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:49:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:49:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:49:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:49:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:49:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.173:443 . 2019.11.20 11:49:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:49:57 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:49:57 - OpenVPN > UDP link remote: [AF_INET]185.156.175.173:443 . 2019.11.20 11:49:57 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.173:443, sid=fb0ec1ae 2b2e139f . 2019.11.20 11:49:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:49:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:49:57 - OpenVPN > VERIFY KU OK . 2019.11.20 11:49:57 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:49:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:49:57 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:49:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Achernar, emailAddress=info@airvpn.org . 2019.11.20 11:49:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:49:57 - OpenVPN > [Achernar] Peer Connection Initiated with [AF_INET]185.156.175.173:443 . 2019.11.20 11:49:59 - OpenVPN > SENT CONTROL [Achernar]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:49:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.98.1,dhcp-option DNS6 fde6:7a:7d20:62::1,tun-ipv6,route-gateway 10.4.98.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:62::104c/64 fde6:7a:7d20:62::1,ifconfig 10.4.98.78 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2019.11.20 11:49:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:49:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:49:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:49:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:49:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:49:59 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:49:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:49:59 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:49:59 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:49:59 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:49:59 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:49:59 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:49:59 - OpenVPN > open_tun . 2019.11.20 11:49:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:49:59 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:49:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.98.0/10.4.98.78/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:49:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.98.78/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.4.98.254, lease-time: 31536000] . 2019.11.20 11:49:59 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:49:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:50:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:62::104c store=active . 2019.11.20 11:50:01 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:62::1 validate=no E 2019.11.20 11:51:20 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:51:24 - OpenVPN > NETSH: command failed . 2019.11.20 11:51:24 - OpenVPN > Exiting due to fatal error ! 2019.11.20 11:51:24 - Disconnecting . 2019.11.20 11:51:24 - Connection terminated. I 2019.11.20 11:51:27 - Checking authorization ... ! 2019.11.20 11:51:27 - Connecting to Baiten (Switzerland, Zurich) . 2019.11.20 11:51:27 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.11.20 11:51:27 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2019.11.20 11:51:27 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.11.20 11:51:27 - Connection to OpenVPN Management Interface . 2019.11.20 11:51:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.11.20 11:51:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:51:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:51:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.11.20 11:51:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.11.20 11:51:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.53:443 . 2019.11.20 11:51:27 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2019.11.20 11:51:27 - OpenVPN > UDP link local: (not bound) . 2019.11.20 11:51:27 - OpenVPN > UDP link remote: [AF_INET]185.156.175.53:443 . 2019.11.20 11:51:27 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.53:443, sid=1e1c00d5 cc65cbfb . 2019.11.20 11:51:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.11.20 11:51:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.11.20 11:51:27 - OpenVPN > VERIFY KU OK . 2019.11.20 11:51:27 - OpenVPN > Validating certificate extended key usage . 2019.11.20 11:51:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.11.20 11:51:27 - OpenVPN > VERIFY EKU OK . 2019.11.20 11:51:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org ! 2019.11.20 11:51:27 - Disconnecting . 2019.11.20 11:51:27 - Sending management termination signal . 2019.11.20 11:51:27 - Management - Send 'signal SIGTERM' . 2019.11.20 11:51:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.11.20 11:51:28 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.11.20 11:51:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.11.20 11:51:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.156.175.53:443 . 2019.11.20 11:51:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2019.11.20 11:51:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.66.1,dhcp-option DNS6 fde6:7a:7d20:742::1,tun-ipv6,route-gateway 10.11.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:742::1051/64 fde6:7a:7d20:742::1,ifconfig 10.11.66.83 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.11.20 11:51:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.11.20 11:51:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.11.20 11:51:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.11.20 11:51:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:51:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.11.20 11:51:29 - OpenVPN > interactive service msg_channel=0 . 2019.11.20 11:51:29 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=74:d0:2b:c6:99:df . 2019.11.20 11:51:29 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.11.20 11:51:29 - OpenVPN > GetBestInterfaceEx() returned if=13 . 2019.11.20 11:51:29 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9ec7:a6ff:fecd:c217 . 2019.11.20 11:51:29 - OpenVPN > GDG6: Metric=516, Loopback=0, AA=1, I=0 . 2019.11.20 11:51:29 - OpenVPN > ROUTE6_GATEWAY fe80::9ec7:a6ff:fecd:c217 I=13 . 2019.11.20 11:51:29 - OpenVPN > open_tun . 2019.11.20 11:51:29 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{61ACA0B8-F82A-467B-A249-923ADD1F6215}.tap . 2019.11.20 11:51:29 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.11.20 11:51:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.11.66.0/10.11.66.83/255.255.255.0 [SUCCEEDED] . 2019.11.20 11:51:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.11.66.83/255.255.255.0 on interface {61ACA0B8-F82A-467B-A249-923ADD1F6215} [DHCP-serv: 10.11.66.254, lease-time: 31536000] . 2019.11.20 11:51:29 - OpenVPN > Successful ARP Flush on interface [28] {61ACA0B8-F82A-467B-A249-923ADD1F6215} . 2019.11.20 11:51:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.11.20 11:51:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=28 fde6:7a:7d20:742::1051 store=active . 2019.11.20 11:51:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection 3 static fde6:7a:7d20:742::1 validate=no . 2019.11.20 11:51:37 - Sending management termination signal . 2019.11.20 11:51:37 - Management - Send 'signal SIGTERM' . 2019.11.20 11:51:37 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2019.11.20 11:51:47 - Sending management termination signal . 2019.11.20 11:51:47 - Management - Send 'signal SIGTERM' . 2019.11.20 11:51:57 - Sending management termination signal . 2019.11.20 11:51:57 - Management - Send 'signal SIGTERM' . 2019.11.20 11:52:07 - Sending management termination signal . 2019.11.20 11:52:07 - Management - Send 'signal SIGTERM' . 2019.11.20 11:52:17 - Sending management termination signal . 2019.11.20 11:52:17 - Management - Send 'signal SIGTERM' . 2019.11.20 11:52:27 - Sending management termination signal . 2019.11.20 11:52:27 - Management - Send 'signal SIGTERM' . 2019.11.20 11:52:37 - Sending management termination signal . 2019.11.20 11:52:37 - Management - Send 'signal SIGTERM' E 2019.11.20 11:52:42 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2019.11.20 11:52:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.11.20 11:52:42 - Above log line repeated 6 times more . 2019.11.20 11:52:42 - OpenVPN > MANAGEMENT: Client disconnected . 2019.11.20 11:52:42 - OpenVPN > NETSH: command failed . 2019.11.20 11:52:42 - OpenVPN > Exiting due to fatal error . 2019.11.20 11:52:42 - Connection terminated. . 2019.11.20 11:52:42 - Flushing DNS . 2019.11.20 11:52:42 - Shell(71) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns'; . 2019.11.20 11:54:51 - Shell(71) done in 129107 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 11:54:51 - Successfully flushed the DNS Resolver Cache.' . 2019.11.20 11:54:51 - Shell(72) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns'; . 2019.11.20 11:54:57 - Shell(72) done in 6099 ms, exit: 0, out: 'Windows IP Configuration . 2019.11.20 11:54:57 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.' ! 2019.11.20 11:54:58 - Session terminated. I've been running airvpn on on 5 of my machines without any problems for years untill now. A few days ago I noticed that on one machine, a PC running windows 7, it was taking up to 10 minutes to make a connection. Then suddenly, two days ago, no connections whatever were possible on this machine irrespective of which server or country I selected. As the NETSH command failed error code 1 message appeared regularly in the logs I uninstalled and reinstalled the TAP driver. No change. (See log) I have eddie version 2.14.5. All the other machines are fine. Hopefully we can resolve this as soon as possible. Thanks.
  22. After using Airvpn, I noticed Youtube would still recommend videos based on my ethnicity. This is frightening because I know Google can still see me easily even when I use a vpn! But if I vary the screen size of the Youtube (Google) webpage - I find that Youtube recommended videos DO NOT offer videos based on my ethnicity. So what are the best methods of not compromising your identity based on screen size and screen res? For example, even TOR tells you to reduce your screen size! Anyone out there with a genius solution?
  23. I'm struggling to reach Latvia from the US so was trying to understand why and if it was a local config issue. Is this a more fundamental internet routing issue? Other POPs appear to work so its not a critical issue for me but I was curious to understand what & why. Thanks. sudo mtr lt.vpn.airdns.org Packets Pings Host Loss% Snt Last Avg Best Wrst StDev 1. 142.254.183.149 0.0% 69 8.3 8.9 6.7 16.7 2.2 2. agg61.vnnzca2402h.socal.rr.com 0.0% 69 9.2 10.8 5.3 16.1 2.1 3. 72.129.14.86 0.0% 69 14.5 13.9 8.0 30.8 3.6 4. agg29.tustcaft01r.socal.rr.com 0.0% 69 19.0 16.0 10.3 29.3 3.6 5. ae-5-0.cr0.chi10.tbone.rr.com 0.0% 68 11.1 16.3 10.4 29.4 3.9 6. 4.68.111.101 67.2% 68 9.3 12.0 9.3 20.7 2.9 7. ae-2-3202.ear4.Amsterdam1.Level3.net 91.0% 68 14149 14400 14149 14582 154.4 8. BR2.Amsterdam1.surf.net 0.0% 68 150.4 150.6 147.6 171.6 3.9 9. ae0-7.RT.OMT.SQQ.LT.retn.net 0.0% 68 192.8 188.8 185.0 218.3 5.7 10. 149.14.10.124 0.0% 68 183.2 184.5 182.2 193.9 2.3 11. 46.166.166.5 14.9% 68 188.2 198.0 187.9 593.7 53.4 12. 124.165.166.46.in-addr.arpa 0.0% 68 190.9 187.1 184.8 194.0 2.4 sudo mtr phact.airvpn.org Host Loss% Snt Last Avg Best Wrst StDev 1. 142.254.183.149 0.0% 40 8.9 10.0 6.9 18.7 2.9 2. agg61.vnnzca2402h.socal.rr.com 0.0% 40 10.8 11.6 8.0 22.1 3.5 3. 72.129.14.86 0.0% 40 16.7 13.9 7.6 27.3 4.3 4. agg29.tustcaft01r.socal.rr.com 0.0% 39 22.7 17.9 10.9 29.6 4.5 5. bu-ether26.tustca4200w-bcr00.tbone.rr.c 0.0% 39 16.9 15.8 9.3 25.5 3.7 6. 4.68.111.101 71.8% 39 10.0 12.3 9.7 16.9 2.2 7. ae-2-3202.ear4.Amsterdam1.Level3.net 89.5% 39 14493 14281 13830 14493 303.6 8. BR2.Amsterdam1.surf.net 0.0% 39 148.5 151.5 147.4 174.1 5.4 9. ae3-7.RT.RTC.RIX.LV.retn.net 0.0% 39 183.2 188.1 182.9 221.1 6.4 10. GW-LatNet.retn.net 63.2% 39 182.4 180.3 178.3 188.7 2.6 11. 85.254.56.198 0.0% 39 184.1 183.4 180.7 191.7 2.7 12. 159.148.186.20 0.0% 39 188.0 191.3 187.6 216.7 5.2 sudo mtr schedir.airvpn.org Host Loss% Snt Last Avg Best Wrst StDev 1. 142.254.183.149 0.0% 31 10.9 9.4 6.8 14.4 2.1 2. agg61.vnnzca2402h.socal.rr.com 0.0% 31 20.2 11.3 8.5 20.2 3.0 3. 72.129.14.86 0.0% 31 17.4 13.3 7.9 20.1 2.7 4. agg29.tustcaft01r.socal.rr.com 0.0% 31 25.3 17.6 11.2 33.5 4.5 5. bu-ether16.tustca4200w-bcr00.tbone.rr.c 0.0% 31 16.6 15.8 10.1 24.0 3.2 6. 4.68.111.101 73.3% 31 9.6 10.0 9.6 10.7 0.0 7. ae-2-3202.ear4.Amsterdam1.Level3.net 96.7% 31 14247 14247 14247 14247 0.0 8. BR2.Amsterdam1.surf.net 0.0% 31 154.8 150.8 147.3 168.0 4.1 9. ae3-7.RT.RTC.RIX.LV.retn.net 0.0% 31 188.3 186.6 183.2 196.8 3.2 10. GW-LatNet.retn.net 67.7% 31 183.1 181.9 178.2 188.8 3.7 11. 85.254.56.198 0.0% 31 187.9 184.1 180.3 201.7 4.3 12. ??? sudo mtr shaula.airvpn.org Host Loss% Snt Last Avg Best Wrst StDev 1. 142.254.183.149 0.0% 39 11.6 9.9 6.5 19.9 3.0 2. agg61.vnnzca2402h.socal.rr.com 0.0% 39 11.6 12.5 8.3 35.0 5.0 3. 72.129.14.86 0.0% 39 11.5 14.3 8.6 26.3 3.6 4. agg29.tustcaft01r.socal.rr.com 0.0% 39 10.5 16.3 10.5 24.3 3.3 5. ae-5-0.cr0.chi10.tbone.rr.com 0.0% 38 22.5 17.3 11.0 23.5 3.3 6. 4.68.111.101 75.7% 38 12.9 13.0 9.5 18.6 2.8 7. ae-2-3202.ear4.Amsterdam1.Level3.net 97.3% 38 14141 14141 14141 14141 0.0 8. BR2.Amsterdam1.surf.net 0.0% 38 149.5 151.4 147.8 164.2 4.1 9. ae1-1.RT.RTC.RIX.LV.retn.net 0.0% 38 179.2 182.2 178.4 196.9 3.8 10. GW-LatNet.retn.net 68.4% 38 179.3 179.6 177.6 182.5 1.3 11. 85.254.56.198 0.0% 38 180.0 183.0 179.8 191.3 2.7 12. ??? sudo mtr meissa.airvpn.org Host Loss% Snt Last Avg Best Wrst StDev 1. 142.254.183.149 0.0% 33 5.1 10.0 5.1 24.3 3.4 2. agg61.vnnzca2402h.socal.rr.com 0.0% 33 9.5 12.1 9.0 23.6 3.4 3. 72.129.14.86 0.0% 33 16.1 15.5 8.6 35.6 5.6 4. agg29.tustcaft01r.socal.rr.com 0.0% 33 20.7 17.7 11.0 29.6 4.1 5. ae-5-0.cr0.chi10.tbone.rr.com 0.0% 33 12.5 17.6 11.0 27.2 3.6 6. 4.68.111.101 71.0% 32 16.4 13.2 9.2 17.1 2.9 7. ae-2-3202.ear4.Amsterdam1.Level3.net 90.3% 32 14508 14310 14209 14508 171.2 8. BR2.Amsterdam1.surf.net 0.0% 32 147.8 151.7 147.8 175.3 6.2 9. ae1-1.RT.RTC.RIX.LV.retn.net 0.0% 32 183.3 183.8 178.5 191.1 3.3 10. GW-LatNet.retn.net 74.2% 32 179.3 182.2 178.1 187.4 3.3 11. 85.254.56.198 0.0% 32 180.2 182.8 179.6 189.9 2.9 12. ???
  24. Last week
  25. i thought as much, but wanted to ask to be sure. thanks for clarifying.
  26. This is AirVPN library stuff. I expect the PC client versions to be rebased on it, if it isn't already, at least in small parts. This way all PC platforms will get it. But since deveopment just started, expect new versions of Eddie 2.x for now.
  27. And another note to OP: You don't have to regenerate keys, just adjust the IP address in the settings. There is no such thing as server-specific keys.
  28. the question was more like, will this AirVPN OpenVPN 3(with all the airvpn fixes and added stuff) come to windows with eddie or will that stay on the 2.x branch of openvpn. anyways, there is no mentioning of Windows as a platform at all in the first post by @Staff only Linux, Mac, Raspbian, OpenBSD and FreeBSD. that's why i asked, but i guess my question wasn't clear enough.
  29. The answer is in the first post by @Staff 😀
  1. Load more activity
×
×
  • Create New...