Jump to content
Not connected, Your IP: 3.236.122.9

All Activity

This stream auto-updates     

  1. Past hour
  2. Yesterday
  3. I 'locked' on Cursa and restarted everything about an hour and twenty minutes ago and it seems to be holding better than Yildun was. Eddie System/Environment Report - 5/16/2021 - 10:18 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19042.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\thech\AppData\Local\Eddie\default.profile Data path: C:\Users\thech\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: Yes, Cursa Detected DNS: fde6:7a:7d20:ace::1, 10.14.206.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 225 ms Test Ping IPv6: 196 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True servers.locklast: True areas.whitelist: us ---------------------------- Logs: . 2021.05.16 15:46:25 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19042.0, Mono/.Net: v4.0.30319 . 2021.05.16 15:46:25 - Command line arguments (0): . 2021.05.16 15:46:26 - Profile path: C:\Users\thech\AppData\Local\Eddie\default.profile . 2021.05.16 15:46:27 - Reading options from C:\Users\thech\AppData\Local\Eddie\default.profile . 2021.05.16 15:46:30 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2021.05.16 15:46:30 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.05.16 15:46:30 - SSH - Version: plink 0.73 . 2021.05.16 15:46:30 - Build platform: 64-bit x86 Windows . 2021.05.16 15:46:30 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.05.16 15:46:30 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.05.16 15:46:30 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2021.05.16 15:46:31 - Recovery. Unexpected crash? . 2021.05.16 15:46:31 - Routes, added a new route, 199.249.223.130 for gateway 10.9.190.1 . 2021.05.16 15:46:31 - Routes, added a new route, 2620:7:6000:1:6747:2e2b:3ddb:cce2 for gateway fde6:7a:7d20:5be::1 . 2021.05.16 15:46:31 - Routes, removed an existing route, 173.44.55.179 for gateway 10.32.190.1 . 2021.05.16 15:46:31 - Routes, removed an existing route, 2607:ff48:aa81:201:1fe5:86ea:10ec:84cc for gateway fde6:7a:7d20:1cbe::1 . 2021.05.16 15:46:31 - Routes, removed an existing route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:46:31 - Routes, removed an existing route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:46:31 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:46:31 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:46:32 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:46:32 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) I 2021.05.16 15:46:32 - Ready . 2021.05.16 15:46:34 - Collect information about AirVPN completed I 2021.05.16 15:46:35 - Session starting. I 2021.05.16 15:46:35 - Checking authorization ... ! 2021.05.16 15:46:36 - Connecting to Yildun (United States of America, Miami) . 2021.05.16 15:46:36 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 15:46:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 15:46:36 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 15:46:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:46:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:46:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:46:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:46:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]173.44.55.181:443 . 2021.05.16 15:46:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 15:46:36 - OpenVPN > UDP link local: (not bound) . 2021.05.16 15:46:36 - OpenVPN > UDP link remote: [AF_INET]173.44.55.181:443 . 2021.05.16 15:46:36 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.181:443, sid=a23a1cda 1f01dd7f . 2021.05.16 15:46:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 15:46:36 - OpenVPN > VERIFY KU OK . 2021.05.16 15:46:36 - OpenVPN > Validating certificate extended key usage . 2021.05.16 15:46:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 15:46:36 - OpenVPN > VERIFY EKU OK . 2021.05.16 15:46:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Yildun, emailAddress=info@airvpn.org . 2021.05.16 15:46:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 15:46:36 - OpenVPN > [Yildun] Peer Connection Initiated with [AF_INET]173.44.55.181:443 . 2021.05.16 15:46:37 - OpenVPN > SENT CONTROL [Yildun]: 'PUSH_REQUEST' (status=1) . 2021.05.16 15:46:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.190.1,dhcp-option DNS6 fde6:7a:7d20:1cbe::1,tun-ipv6,route-gateway 10.32.190.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1cbe::10a6/64 fde6:7a:7d20:1cbe::1,ifconfig 10.32.190.168 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.05.16 15:46:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 15:46:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 15:46:37 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 15:46:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:46:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:46:37 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 15:46:37 - OpenVPN > ROUTE_GATEWAY 192.168.10.1/255.255.255.0 I=4 HWADDR=e0:3f:49:e9:f3:df . 2021.05.16 15:46:37 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.05.16 15:46:37 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2021.05.16 15:46:37 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::1 . 2021.05.16 15:46:37 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.05.16 15:46:37 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=4 . 2021.05.16 15:46:37 - OpenVPN > open_tun . 2021.05.16 15:46:37 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 15:46:37 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 15:46:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.190.0/10.32.190.168/255.255.255.0 [SUCCEEDED] . 2021.05.16 15:46:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.190.168/255.255.255.0 on interface {82132F6F-A5B3-4876-A518-C0AE223E596F} [DHCP-serv: 10.32.190.254, lease-time: 31536000] . 2021.05.16 15:46:37 - OpenVPN > Successful ARP Flush on interface [10] {82132F6F-A5B3-4876-A518-C0AE223E596F} . 2021.05.16 15:46:37 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:46:37 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:1cbe::10a6/128 store=active . 2021.05.16 15:46:37 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1cbe::/64 -> fde6:7a:7d20:1cbe::10a6 metric 0) dev Local Area Connection . 2021.05.16 15:46:37 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1cbe::/64 10 fe80::8 store=active . 2021.05.16 15:46:37 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:46:37 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:46:37 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 10 static fde6:7a:7d20:1cbe::1 validate=no . 2021.05.16 15:46:37 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:46:37 - Collect information about AirVPN completed . 2021.05.16 15:46:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\route.exe ADD 173.44.55.181 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:46:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:46:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.190.1 . 2021.05.16 15:46:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:46:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.190.1 . 2021.05.16 15:46:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:46:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:46:42 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1cbe::1 metric -1) dev Local Area Connection . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 10 fe80::8 store=active . 2021.05.16 15:46:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:46:42 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1cbe::1 metric -1) dev Local Area Connection . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:46:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:46:42 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1cbe::1 metric -1) dev Local Area Connection . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:46:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:46:42 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1cbe::1 metric -1) dev Local Area Connection . 2021.05.16 15:46:42 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:46:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:46:42 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 15:46:42 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 15:46:42 - DNS leak protection with packet filtering enabled. . 2021.05.16 15:46:43 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.32.190.1) . 2021.05.16 15:46:43 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:1cbe::1) . 2021.05.16 15:46:43 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.32.190.1) . 2021.05.16 15:46:43 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1cbe::1) . 2021.05.16 15:46:43 - Routes, restored a previously deleted route, 173.44.55.179 for gateway 10.32.190.1 . 2021.05.16 15:46:43 - Routes, restored a previously deleted route, 2607:ff48:aa81:201:1fe5:86ea:10ec:84cc for gateway fde6:7a:7d20:1cbe::1 . 2021.05.16 15:46:43 - Flushing DNS I 2021.05.16 15:46:43 - Checking route IPv4 I 2021.05.16 15:46:44 - Checking route IPv6 I 2021.05.16 15:46:48 - Checking DNS ! 2021.05.16 15:46:49 - Connected. . 2021.05.16 15:46:49 - OpenVPN > Initialization Sequence Completed ! 2021.05.16 15:48:27 - Disconnecting . 2021.05.16 15:48:28 - Routes, removed an existing route, 173.44.55.179 for gateway 10.32.190.1 . 2021.05.16 15:48:28 - Routes, removed an existing route, 2607:ff48:aa81:201:1fe5:86ea:10ec:84cc for gateway fde6:7a:7d20:1cbe::1 . 2021.05.16 15:48:28 - Sending soft termination signal . 2021.05.16 15:48:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\route.exe DELETE 173.44.55.181 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:48:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.32.190.1 . 2021.05.16 15:48:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.32.190.1 . 2021.05.16 15:48:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:48:33 - OpenVPN > delete_route_ipv6(::/3) . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 10 fe80::8 store=active . 2021.05.16 15:48:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:33 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:48:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:33 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:48:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:33 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:48:33 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:33 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 15:48:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:48:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1cbe::/64) . 2021.05.16 15:48:33 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1cbe::/64 10 fe80::8 store=active . 2021.05.16 15:48:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 10 fde6:7a:7d20:1cbe::10a6 store=active . 2021.05.16 15:48:33 - OpenVPN > TAP: DHCP address released . 2021.05.16 15:48:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.16 15:48:33 - Connection terminated. . 2021.05.16 15:48:33 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:48:33 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:48:34 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:48:34 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:48:34 - DNS leak protection with packet filtering disabled. . 2021.05.16 15:48:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 15:48:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2021.05.16 15:48:34 - Checking authorization ... ! 2021.05.16 15:48:34 - Connecting to Cursa (United States of America, Miami) . 2021.05.16 15:48:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 15:48:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 15:48:34 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 15:48:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:48:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:48:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:48:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:48:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]96.47.229.61:443 . 2021.05.16 15:48:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 15:48:34 - OpenVPN > UDP link local: (not bound) . 2021.05.16 15:48:34 - OpenVPN > UDP link remote: [AF_INET]96.47.229.61:443 . 2021.05.16 15:48:34 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.61:443, sid=68946de5 0ccc8574 . 2021.05.16 15:48:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 15:48:35 - OpenVPN > VERIFY KU OK . 2021.05.16 15:48:35 - OpenVPN > Validating certificate extended key usage . 2021.05.16 15:48:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 15:48:35 - OpenVPN > VERIFY EKU OK . 2021.05.16 15:48:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cursa, emailAddress=info@airvpn.org . 2021.05.16 15:48:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 15:48:35 - OpenVPN > [Cursa] Peer Connection Initiated with [AF_INET]96.47.229.61:443 . 2021.05.16 15:48:36 - OpenVPN > SENT CONTROL [Cursa]: 'PUSH_REQUEST' (status=1) . 2021.05.16 15:48:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.206.1,dhcp-option DNS6 fde6:7a:7d20:ace::1,tun-ipv6,route-gateway 10.14.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ace::1013/64 fde6:7a:7d20:ace::1,ifconfig 10.14.206.21 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.16 15:48:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 15:48:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 15:48:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 15:48:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:48:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:48:36 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 15:48:36 - OpenVPN > ROUTE_GATEWAY 192.168.10.1/255.255.255.0 I=4 HWADDR=e0:3f:49:e9:f3:df . 2021.05.16 15:48:36 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.05.16 15:48:36 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2021.05.16 15:48:36 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::1 . 2021.05.16 15:48:36 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.05.16 15:48:36 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=4 . 2021.05.16 15:48:36 - OpenVPN > open_tun . 2021.05.16 15:48:36 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 15:48:36 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 15:48:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.206.0/10.14.206.21/255.255.255.0 [SUCCEEDED] . 2021.05.16 15:48:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.206.21/255.255.255.0 on interface {82132F6F-A5B3-4876-A518-C0AE223E596F} [DHCP-serv: 10.14.206.254, lease-time: 31536000] . 2021.05.16 15:48:36 - OpenVPN > Successful ARP Flush on interface [10] {82132F6F-A5B3-4876-A518-C0AE223E596F} . 2021.05.16 15:48:36 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:48:36 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:ace::1013/128 store=active . 2021.05.16 15:48:36 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ace::/64 -> fde6:7a:7d20:ace::1013 metric 0) dev Local Area Connection . 2021.05.16 15:48:36 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ace::/64 10 fe80::8 store=active . 2021.05.16 15:48:36 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:36 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:48:36 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 10 static fde6:7a:7d20:ace::1 validate=no . 2021.05.16 15:48:36 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:48:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\route.exe ADD 96.47.229.61 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:48:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:48:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:48:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:48:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:48:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:48:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:48:41 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 10 fe80::8 store=active . 2021.05.16 15:48:41 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:41 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:48:41 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:41 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:48:41 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:41 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:48:41 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:48:41 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:48:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 15:48:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 15:48:41 - DNS leak protection with packet filtering enabled. . 2021.05.16 15:48:42 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.14.206.1) . 2021.05.16 15:48:42 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:48:42 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.14.206.1) . 2021.05.16 15:48:42 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:48:42 - Routes, restored a previously deleted route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:48:42 - Routes, restored a previously deleted route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:48:42 - Flushing DNS I 2021.05.16 15:48:42 - Checking route IPv4 I 2021.05.16 15:48:43 - Checking route IPv6 I 2021.05.16 15:48:46 - Checking DNS ! 2021.05.16 15:48:47 - Connected. . 2021.05.16 15:48:47 - OpenVPN > Initialization Sequence Completed . 2021.05.16 15:50:39 - OpenVPN > [Cursa] Inactivity timeout (--ping-restart), restarting . 2021.05.16 15:50:39 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.16 15:50:39 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.16 15:50:39 - Disconnecting . 2021.05.16 15:50:39 - Routes, removed an existing route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:50:39 - Routes, removed an existing route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:50:39 - Sending soft termination signal . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\route.exe DELETE 96.47.229.61 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:50:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:50:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:50:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:50:44 - OpenVPN > delete_route_ipv6(::/3) . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 10 fe80::8 store=active . 2021.05.16 15:50:44 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:44 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:50:44 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:44 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:50:44 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:44 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:50:44 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:44 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 15:50:44 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:50:44 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ace::/64) . 2021.05.16 15:50:44 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ace::/64 10 fe80::8 store=active . 2021.05.16 15:50:44 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 10 fde6:7a:7d20:ace::1013 store=active . 2021.05.16 15:50:44 - OpenVPN > TAP: DHCP address released . 2021.05.16 15:50:44 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.16 15:50:44 - Connection terminated. . 2021.05.16 15:50:45 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:50:45 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:50:45 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:50:45 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:50:45 - DNS leak protection with packet filtering disabled. . 2021.05.16 15:50:45 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 15:50:45 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2021.05.16 15:50:48 - Checking authorization ... ! 2021.05.16 15:50:49 - Connecting to Cursa (United States of America, Miami) . 2021.05.16 15:50:49 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 15:50:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 15:50:49 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 15:50:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:50:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:50:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:50:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:50:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]96.47.229.61:443 . 2021.05.16 15:50:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 15:50:49 - OpenVPN > UDP link local: (not bound) . 2021.05.16 15:50:49 - OpenVPN > UDP link remote: [AF_INET]96.47.229.61:443 . 2021.05.16 15:50:49 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.61:443, sid=b6b80ad6 4ae71947 . 2021.05.16 15:50:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 15:50:49 - OpenVPN > VERIFY KU OK . 2021.05.16 15:50:49 - OpenVPN > Validating certificate extended key usage . 2021.05.16 15:50:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 15:50:49 - OpenVPN > VERIFY EKU OK . 2021.05.16 15:50:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cursa, emailAddress=info@airvpn.org . 2021.05.16 15:50:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 15:50:49 - OpenVPN > [Cursa] Peer Connection Initiated with [AF_INET]96.47.229.61:443 . 2021.05.16 15:50:50 - OpenVPN > SENT CONTROL [Cursa]: 'PUSH_REQUEST' (status=1) . 2021.05.16 15:50:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.206.1,dhcp-option DNS6 fde6:7a:7d20:ace::1,tun-ipv6,route-gateway 10.14.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ace::1013/64 fde6:7a:7d20:ace::1,ifconfig 10.14.206.21 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.16 15:50:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 15:50:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 15:50:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 15:50:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:50:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:50:50 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 15:50:50 - OpenVPN > ROUTE_GATEWAY 192.168.10.1/255.255.255.0 I=4 HWADDR=e0:3f:49:e9:f3:df . 2021.05.16 15:50:50 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.05.16 15:50:50 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2021.05.16 15:50:50 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::1 . 2021.05.16 15:50:50 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.05.16 15:50:50 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=4 . 2021.05.16 15:50:50 - OpenVPN > open_tun . 2021.05.16 15:50:50 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 15:50:50 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 15:50:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.206.0/10.14.206.21/255.255.255.0 [SUCCEEDED] . 2021.05.16 15:50:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.206.21/255.255.255.0 on interface {82132F6F-A5B3-4876-A518-C0AE223E596F} [DHCP-serv: 10.14.206.254, lease-time: 31536000] . 2021.05.16 15:50:50 - OpenVPN > Successful ARP Flush on interface [10] {82132F6F-A5B3-4876-A518-C0AE223E596F} . 2021.05.16 15:50:50 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:50:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:ace::1013/128 store=active . 2021.05.16 15:50:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ace::/64 -> fde6:7a:7d20:ace::1013 metric 0) dev Local Area Connection . 2021.05.16 15:50:50 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ace::/64 10 fe80::8 store=active . 2021.05.16 15:50:50 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:50:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 10 static fde6:7a:7d20:ace::1 validate=no . 2021.05.16 15:50:50 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:50:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 15:50:55 - OpenVPN > C:\windows\system32\route.exe ADD 96.47.229.61 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:50:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:50:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:50:55 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:50:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:50:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:50:55 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:50:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:50:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:50:55 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:50:55 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 10 fe80::8 store=active . 2021.05.16 15:50:55 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:56 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:50:56 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:50:56 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:56 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:50:56 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:50:56 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:56 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:50:56 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:50:56 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:50:56 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 15:50:56 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 15:50:56 - DNS leak protection with packet filtering enabled. . 2021.05.16 15:50:56 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.14.206.1) . 2021.05.16 15:50:56 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:50:57 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.14.206.1) . 2021.05.16 15:50:57 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:50:57 - Routes, restored a previously deleted route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:50:57 - Routes, restored a previously deleted route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:50:57 - Flushing DNS I 2021.05.16 15:50:57 - Checking route IPv4 I 2021.05.16 15:50:57 - Checking route IPv6 I 2021.05.16 15:51:01 - Checking DNS ! 2021.05.16 15:51:02 - Connected. . 2021.05.16 15:51:02 - OpenVPN > Initialization Sequence Completed . 2021.05.16 15:52:53 - OpenVPN > [Cursa] Inactivity timeout (--ping-restart), restarting . 2021.05.16 15:52:53 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.16 15:52:53 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.16 15:52:53 - Disconnecting . 2021.05.16 15:52:53 - Routes, removed an existing route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:52:53 - Routes, removed an existing route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:52:53 - Sending soft termination signal . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\route.exe DELETE 96.47.229.61 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:52:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:52:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:52:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 15:52:58 - OpenVPN > delete_route_ipv6(::/3) . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route ::/3 10 fe80::8 store=active . 2021.05.16 15:52:58 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:52:58 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:52:58 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:52:58 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:52:58 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:52:58 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.05.16 15:52:58 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:52:58 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:52:58 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 15:52:58 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:52:59 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ace::/64) . 2021.05.16 15:52:59 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ace::/64 10 fe80::8 store=active . 2021.05.16 15:52:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete address 10 fde6:7a:7d20:ace::1013 store=active . 2021.05.16 15:52:59 - OpenVPN > TAP: DHCP address released . 2021.05.16 15:52:59 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.16 15:52:59 - Connection terminated. . 2021.05.16 15:52:59 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:52:59 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 15:52:59 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:52:59 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2021.05.16 15:52:59 - DNS leak protection with packet filtering disabled. . 2021.05.16 15:52:59 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 15:52:59 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2021.05.16 15:53:02 - Checking authorization ... ! 2021.05.16 15:53:03 - Connecting to Cursa (United States of America, Miami) . 2021.05.16 15:53:03 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 15:53:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 15:53:03 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 15:53:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:53:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:53:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 15:53:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 15:53:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]96.47.229.61:443 . 2021.05.16 15:53:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 15:53:03 - OpenVPN > UDP link local: (not bound) . 2021.05.16 15:53:03 - OpenVPN > UDP link remote: [AF_INET]96.47.229.61:443 . 2021.05.16 15:53:03 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.61:443, sid=82170146 bcdf9898 . 2021.05.16 15:53:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 15:53:03 - OpenVPN > VERIFY KU OK . 2021.05.16 15:53:03 - OpenVPN > Validating certificate extended key usage . 2021.05.16 15:53:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 15:53:03 - OpenVPN > VERIFY EKU OK . 2021.05.16 15:53:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cursa, emailAddress=info@airvpn.org . 2021.05.16 15:53:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 15:53:03 - OpenVPN > [Cursa] Peer Connection Initiated with [AF_INET]96.47.229.61:443 . 2021.05.16 15:53:04 - OpenVPN > SENT CONTROL [Cursa]: 'PUSH_REQUEST' (status=1) . 2021.05.16 15:53:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.206.1,dhcp-option DNS6 fde6:7a:7d20:ace::1,tun-ipv6,route-gateway 10.14.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ace::1013/64 fde6:7a:7d20:ace::1,ifconfig 10.14.206.21 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.16 15:53:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 15:53:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 15:53:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 15:53:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:53:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 15:53:04 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 15:53:04 - OpenVPN > ROUTE_GATEWAY 192.168.10.1/255.255.255.0 I=4 HWADDR=e0:3f:49:e9:f3:df . 2021.05.16 15:53:04 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.05.16 15:53:04 - OpenVPN > GetBestInterfaceEx() returned if=4 . 2021.05.16 15:53:04 - OpenVPN > GDG6: II=4 DP=::/0 NH=fe80::1 . 2021.05.16 15:53:04 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.05.16 15:53:04 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=4 . 2021.05.16 15:53:04 - OpenVPN > open_tun . 2021.05.16 15:53:04 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 15:53:04 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 15:53:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.206.0/10.14.206.21/255.255.255.0 [SUCCEEDED] . 2021.05.16 15:53:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.206.21/255.255.255.0 on interface {82132F6F-A5B3-4876-A518-C0AE223E596F} [DHCP-serv: 10.14.206.254, lease-time: 31536000] . 2021.05.16 15:53:04 - OpenVPN > Successful ARP Flush on interface [10] {82132F6F-A5B3-4876-A518-C0AE223E596F} . 2021.05.16 15:53:04 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:53:04 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:ace::1013/128 store=active . 2021.05.16 15:53:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ace::/64 -> fde6:7a:7d20:ace::1013 metric 0) dev Local Area Connection . 2021.05.16 15:53:04 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ace::/64 10 fe80::8 store=active . 2021.05.16 15:53:04 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:53:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2021.05.16 15:53:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv6 set dns 10 static fde6:7a:7d20:ace::1 validate=no . 2021.05.16 15:53:05 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.05.16 15:53:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\route.exe ADD 96.47.229.61 MASK 255.255.255.255 192.168.10.1 . 2021.05.16 15:53:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:53:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:53:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:53:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.206.1 . 2021.05.16 15:53:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 15:53:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 15:53:10 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route ::/3 10 fe80::8 store=active . 2021.05.16 15:53:10 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:53:10 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 2000::/4 10 fe80::8 store=active . 2021.05.16 15:53:10 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:53:10 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route 3000::/4 10 fe80::8 store=active . 2021.05.16 15:53:10 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:53:10 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ace::1 metric -1) dev Local Area Connection . 2021.05.16 15:53:10 - OpenVPN > C:\windows\system32\netsh.exe interface ipv6 add route fc00::/7 10 fe80::8 store=active . 2021.05.16 15:53:10 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2021.05.16 15:53:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 15:53:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 15:53:10 - DNS leak protection with packet filtering enabled. . 2021.05.16 15:53:11 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.14.206.1) . 2021.05.16 15:53:11 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:53:11 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.14.206.1) . 2021.05.16 15:53:11 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:ace::1) . 2021.05.16 15:53:11 - Routes, restored a previously deleted route, 96.47.229.59 for gateway 10.14.206.1 . 2021.05.16 15:53:11 - Routes, restored a previously deleted route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ace::1 . 2021.05.16 15:53:11 - Flushing DNS I 2021.05.16 15:53:11 - Checking route IPv4 I 2021.05.16 15:53:12 - Checking route IPv6 I 2021.05.16 15:53:16 - Checking DNS ! 2021.05.16 15:53:16 - Connected. . 2021.05.16 15:53:16 - OpenVPN > Initialization Sequence Completed . 2021.05.16 16:16:42 - Collect information about AirVPN completed . 2021.05.16 16:51:44 - Above log line repeated 1 times more . 2021.05.16 16:51:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 16:51:44 - OpenVPN > VERIFY KU OK . 2021.05.16 16:51:44 - OpenVPN > Validating certificate extended key usage . 2021.05.16 16:51:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 16:51:44 - OpenVPN > VERIFY EKU OK . 2021.05.16 16:51:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cursa, emailAddress=info@airvpn.org . 2021.05.16 16:51:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 16:51:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 16:51:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 17:16:43 - Collect information about AirVPN completed . 2021.05.16 17:18:18 - ping 1 . 2021.05.16 17:18:18 - ping 2 W . 2021.05.16 17:18:18 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "192.168.10.1", "metric": "281" }, { "address": "0.0.0.0\/1", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "10.14.206.1", "metric": "3" }, { "address": "10.14.206.0\/24", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "10.14.206.21", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "10.14.206.255", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "96.47.229.59", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "10.14.206.1", "metric": "4" }, { "address": "96.47.229.61", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "192.168.10.1", "metric": "25" }, { "address": "127.0.0.0\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "10.14.206.1", "metric": "3" }, { "address": "192.168.10.0\/24", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "192.168.10.145", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "192.168.10.255", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "199.249.223.130", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "10.9.190.1", "metric": "4" }, { "address": "224.0.0.0\/4", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "::\/0", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "fe80::1", "metric": "281" }, { "address": "::\/3", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fe80::8", "metric": "259" }, { "address": "2607:ff48:aa81:0:63d0:a812:fcd8:93ba", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fde6:7a:7d20:ace::1", "metric": "259" }, { "address": "2620:7:6000:1:6747:2e2b:3ddb:cce2", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fde6:7a:7d20:5be::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:ace::\/64", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:ace::1013", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "fe80::2593:767d:4cf3:79a5", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "fe80::f9c8:f045:de49:c786", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "gateway": "link", "metric": "281" }, { "address": "2620:7:6000:1:6747:2e2b:3ddb:cce2", "gateway": "fde6:7a:7d20:5be::1", "metric": "4294967295" }, { "address": "2607:ff48:aa81:0:63d0:a812:fcd8:93ba", "gateway": "fde6:7a:7d20:ace::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "453461049", "bytes_sent": "258607754", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:ace::1013", "fe80::f9c8:f045:de49:c786", "10.14.206.21" ], "gateways": [ "10.14.206.1", "10.9.190.1", "fe80::8", "fde6:7a:7d20:ace::1", "fde6:7a:7d20:5be::1" ], "bind": true, "dns4": "10.14.206.1", "dns6": null }, { "friendly": "Ethernet", "id": "{1EEBA82E-9611-4AEF-A925-FEAFEE8F28FE}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "488837205", "bytes_sent": "310823521", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::2593:767d:4cf3:79a5", "192.168.10.145" ], "gateways": [ "192.168.10.1", "fe80::1" ], "bind": true, "dns4": "10.14.206.1", "dns6": null }, { "friendly": "Ethernet 2", "id": "{8EA99D1D-AB45-4583-88BC-050275F08D1A}", "name": "Ethernet 2", "description": "AnchorFree TAP-Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::526:b73a:165d:da27", "169.254.218.39" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.14.206.1", "ipv4-default-interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{82132F6F-A5B3-4876-A518-C0AE223E596F}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : SONOFALIENTOO Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-82-13-2F-6F DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:ace::1013(Preferred) Link-local IPv6 Address . . . . . : fe80::f9c8:f045:de49:c786%10(Preferred) IPv4 Address. . . . . . . . . . . : 10.14.206.21(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, May 16, 2021 3:53:04 PM Lease Expires . . . . . . . . . . : Monday, May 16, 2022 3:53:04 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.14.206.254 DHCPv6 IAID . . . . . . . . . . . : 587267970 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-88-4D-46-E0-3F-49-E9-F3-DF DNS Servers . . . . . . . . . . . : fde6:7a:7d20:ace::1 10.14.206.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : E0-3F-49-E9-F3-DF DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::2593:767d:4cf3:79a5%4(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.10.145(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : fe80::1%4 192.168.10.1 DHCPv6 IAID . . . . . . . . . . . : 350240585 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-88-4D-46-E0-3F-49-E9-F3-DF DNS Servers . . . . . . . . . . . : fde6:7a:7d20:ace::1 10.14.206.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : AnchorFree TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-8E-A9-9D-1D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes
  4. For OpenVPN to be available in NetworkManager you need its OpenVPN plugin, package name is network-manager-openvpn in Debian/Ubuntu and networkmanager-openvpn in all other families.
  5. It looks like a stock router from your ISP, they usually don't ship with OpenVPN, so the answer is probably no. As for the PC disconnections, try a connection, then in Logs tab of Eddie click on the lifebelt icon and paste/upload the output here. There are too many possible reasons for a connection to "loop" to say what the issue is.
  6. I will take that under advisement, thank you for the time you spent to help me troubleshoot this.
  7. I just moved to a new house internet connection already set up with a Huawei HG8546M router installed. I've managed to access the router's settings, but don't know what to do to set it up for AirVPN? Has anyone already done this or have some pointers to get me started? I have Eddie clients on my linux mint laptop and windows 10 computer running, but both seem to be dropping the connection periodically and reconnecting to another server. The drops seem to get worse if I 'lock server'...which I need for a static external IP address for my Shoutcast Server stream. Thanks in advance for any help at all!
  8. Hello everyone, Since I updated my router firmware from merlin 384.19 to 386_2_4 i get slow speeds on my vpn connection. I use the same config i used before i updated. But speeds dropped a lot, it was like 25MB/s with the old firmware and with the new firmware it's like 15MB/s. It never gets over 15MB/s. To me it looks like there's nothing changed on the config side of things in my router but i might be wrong. The only thing that changed is the Openvpn version the router uses. On the old firmware it was 2.4.9 and the new uses 2.5.2. I did make a new config in the generator for version 2.5 (AES not automatic) to use on the router. Any ideas are welcome, like to solve it rather than go back to the old firmware.
  9. Thanks guys. It's not available in the NetworkManager interface, maybe if you talk to OpenVPN directly it will work. But it's also written like this in the documentation: https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/ For those interested, here's the issue link for IPv6 support. It will be fixed within a year if we're lucky https://community.openvpn.net/openvpn/ticket/1161 Yes I think I've had encountered that on another occasion but I believe it was related to overriding an existing route with another route of lower metric, in other words de-prioritizing another route... iirc it seemed the old route was sorta cached and continued to be used for some limited time. This will not be encountered if your application binds to a specific interface that leaves no other options though (like our case). Uh that's really hard to explain or to grasp because there're two different entities that do the same thing but at the same time they're really different. Specific routes: you can always override an existing route with a more specific one. We actually only do this for the connection to the VPN server so it always runs via the public internet, no matter the settings (this in particular avoids stacking multiple VPN connections aka unintended multi-hopping). Alternative routes: normally your system will always have a 'catch-all' 0.0.0.0/0 route. If we added an alternative route, it would only be used under the following circumstances: the new route has a more favorable metric (lower) the application explicitly binds to an IP that is only available to the second interface, thus forcing to use the new route The second 0.0.0.0/0 route and binding to the second IP work in tandem. The traffic splitting is really done by the application requesting communication over the 2nd IP (the VPN interface). That's what it looks like: AirVPN-TAP network interface has your internal address as 10.20.30.42. The application requests a new listening socket on 10.20.30.42:35361 Now the application can only be reached via that IP address, i.e. only reachable via VPN. Like you can't even reach it via the localhost address: 127.0.0.1:35361. In fact you can have an entirely different service running on 127.0.0.1:35361, because it is not occupied. If the application wants to connect to someone. It requests a connection from 10.20.30.42:35361 to <Target-IP:port> Since no other interface has an assigned IP of 10.20.30.42, the VPN interface is the only one up to consideration 0.0.0.0/0 via 10.20.30.1 (internal IP of VPN Server within the tunnel) says that any IP is reachable via VPN server Your OS routes that request via the VPN interface(tunnel) then. It is an entirely different story how the VPN itself is reached You can try all of that out with curl and ifconfig.co. It's curl that decides which interface to bind to and ultimately where the packets will originate from. Even if you have a 'kill switch' VPN, you can still override it with curl (or any malware could for that matter), just set your LAN IP to override the default route. You can (maybe?) fix it with a firewall or as I suggested in the guide: an intermediary device to force all traffic through the VPN (a virtual machine set to NAT mode should work, in that case the host OS will be that device). Keep in mind, this comes quite handy in cases where you're rate-limited based on the IP address. You can use your home IP and your VPN IP simultaneously now: just instruct the program to use a certain IP. In case of IPv6 you get 4 IPs instead of 2. Use that hidden knowledge to your advantage
  10. Download the app in the Firestick Sent from my iPhone using Tapatalk
  11. Heya guys Is it possible to use AIR VPN with an Amazon Fire TV Stick and then e.g. To stream ORF, I need an Austrian IP. =)
  12. For what it is worth, I have seen on Windows that routing metrics may be ignored in some instances. I once used a method that relied on route metrics. The VPN would not be used unless a program was bound to the VPN interface. But one day while using a Usenet client with many connections to the server I noticed that for some connections the route with a worse metric was chosen. EDIT: By the way, you said "only select programs will be able to use the VPN connection". It appears to me that traffic splitting here is done based on the destination of the connection, not based on which program is making the connection. Or did I miss something?
  13. I'm not sure I understand. If my machine crashes and reboots, shouldn't the network lock feature keep my Internet from working at all and thus from receiving/sending packets outside of the VPN tunnel? This is not what happens in my case. If I manually reboot my machine, on reboot my Internet connection is working and I'm not connected to any AirVPN server. And as I said, I do have networklockpersist and networklock values set to on in /etc/airvpn/bluetit.rc $ systemctl status bluetit.service (right after a savage reboot): × bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: failed (Result: exit-code) since Sun 2021-05-16 15:16:08 CEST; 28s ago Process: 2111 ExecStart=/sbin/bluetit (code=exited, status=1/FAILURE) CPU: 7ms systemd[1]: Starting AirVPN Bluetit Daemon... bluetit[2111]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC4 - 14 May 2021 bluetit[2111]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit bluetit[2111]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. bluetit[2111]: Bluetit is already running or did not exit gracefully on its last run or has been killed. Exit> systemd[1]: bluetit.service: Control process exited, code=exited, status=1/FAILURE systemd[1]: bluetit.service: Failed with result 'exit-code'. systemd[1]: Failed to start AirVPN Bluetit Daemon. Then, I run $ goldcrest --recover-network: 2021-05-16 15:17:42 Reading run control directives from file /home/user/.config/goldcrest.rc Goldcrest 1.1.0 RC4 - 14 May 2021 2021-05-16 15:17:42 ERROR: D-Bus service org.airvpn.server is not available $ systemctl status bluetit.service: ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: active (running) since Sun 2021-05-16 15:18:38 CEST; 3s ago Process: 2828 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Main PID: 2830 (bluetit) Tasks: 2 (limit: 19052) Memory: 4.6M CPU: 42ms CGroup: /system.slice/bluetit.service └─2830 /sbin/bluetit systemd[1]: Started AirVPN Bluetit Daemon. bluetit[2830]: Bluetit did not exit gracefully on its last run or has been killed. bluetit[2830]: Run recover network procedure or restore system settings saved in /etc/airvpn bluetit[2830]: ERROR: Connection to AirVPN's ipleak.net cancelled. It seems Bluetit did not exit gracefully o> Your system may not be working properly and your network connection may not work as expected. To recover your network settings, run this program again and use the "--recover-network" option. bluetit[2830]: AirVPN Manifest updater thread started bluetit[2830]: AirVPN Manifest update interval is 15 minutes bluetit[2830]: ERROR: Cannot start AirVPN boot connection. It seems Bluetit did not exit gracefully or has be> Your system may not be working properly and your network connection may not work as expected. To recover your network settings, run this program again and use the "--recover-network" option. bluetit[2830]: AirVPN Manifest update suspended: AirVPN boot connection initialization in progress bluetit[2830]: Updating AirVPN Manifest bluetit[2830]: AirVPN Manifest successfully retrieved from server Then, I run $ goldcrest --recover-network again: 2021-05-16 15:20:57 Reading run control directives from file /home/user/.config/goldcrest.rc Goldcrest 1.1.0 RC4 - 14 May 2021 2021-05-16 15:20:57 Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC4 - 14 May 2021 2021-05-16 15:20:57 OpenVPN core 3.7 AirVPN linux x86_64 64-bit 2021-05-16 15:20:57 Bluetit does not need a network recovery. 2021-05-16 15:20:57 Bluetit session terminated $ systemctl status bluetit.service: ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: active (running) since Sun 2021-05-16 15:18:38 CEST; 1min 21s ago Process: 2828 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Main PID: 2830 (bluetit) Tasks: 2 (limit: 19052) Memory: 4.8M CPU: 104ms CGroup: /system.slice/bluetit.service └─2830 /sbin/bluetit bluetit[2830]: AirVPN Manifest update interval is 15 minutes bluetit[2830]: ERROR: Cannot start AirVPN boot connection. It seems Bluetit did not exit gracefully or has be> Your system may not be working properly and your network connection may not work as expected. To recover your network settings, run this program again and use the "--recover-network" option. bluetit[2830]: AirVPN Manifest update suspended: AirVPN boot connection initialization in progress bluetit[2830]: Updating AirVPN Manifest bluetit[2830]: AirVPN Manifest successfully retrieved from server bluetit[2830]: Requested method "version" bluetit[2830]: Requested method "openvpn_info" bluetit[2830]: Requested method "recover_network -> " bluetit[2830]: Successfully restored DNS settings bluetit[2830]: Network filter successfully restored Still not any connection established to a AirVPN server at this point. I finally have to run $ sudo systemctl restart bluetit.service to connect to an AirVPN server. Am I doing something wrong? --- Now regarding bluetit.service no longer working after resuming from suspend/hibernate. Various outputs taken right after resuming from suspend: $ systemctl bluetit.service ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: active (running) since Sun 2021-05-16 15:22:13 CEST; 2min 20s ago Process: 2922 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Main PID: 2924 (bluetit) Tasks: 4 (limit: 19052) Memory: 7.1M CPU: 578ms CGroup: /system.slice/bluetit.service └─2924 /sbin/bluetit bluetit[2924]: UDP send exception: send: Network is unreachable bluetit[2924]: ERROR: NETWORK_SEND_ERROR bluetit[2924]: ERROR: KEEPALIVE_TIMEOUT bluetit[2924]: Session invalidated: KEEPALIVE_TIMEOUT bluetit[2924]: Client terminated, restarting in 2000 ms... bluetit[2924]: EVENT: RECONNECTING bluetit[2924]: ERROR: N_RECONNECT bluetit[2924]: Contacting xxx.xxx.xxx.xxx:443 via UDP bluetit[2924]: EVENT: WAIT bluetit[2924]: Connecting to [xxx.vpn.airdns.org]:443 (xxx.xxx.xxx.xxx) via UDPv4 It keeps repeating this loop every 10 seconds and never reconnects. At this point, I don't have any working Internet connection at all, even outside of the tunnel. If I run $ goldcrest --recover-network and $ systemctl status bluetit.service again: ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: active (running) since Sun 2021-05-16 15:22:13 CEST; 4min 41s ago Process: 2922 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Main PID: 2924 (bluetit) Tasks: 4 (limit: 19052) Memory: 7.1M CPU: 643ms CGroup: /system.slice/bluetit.service └─2924 /sbin/bluetit bluetit[2924]: ERROR: N_RECONNECT bluetit[2924]: Contacting xxx.xxx.xxx.xxx:443 via UDP bluetit[2924]: EVENT: WAIT bluetit[2924]: Connecting to [xxx.vpn.airdns.org]:443 (xxx.xxx.xxx.xxx) via UDPv4 bluetit[2924]: Server poll timeout, trying next remote entry... bluetit[2924]: EVENT: RECONNECTING bluetit[2924]: ERROR: N_RECONNECT bluetit[2924]: Contacting xxx.xxx.xxx.xxx:443 via UDP bluetit[2924]: EVENT: WAIT bluetit[2924]: Connecting to [xxx.vpn.airdns.org]:443 (xxx.xxx.xxx.xxx) via UDPv4 I have to run $ sudo systemctl restart bluetit.service in order to successfully connect to an AirVPN server. To sum up: I have to run $ goldcrest --recover-network and $ sudo systemctl restart bluetit.service after resuming from suspend/hibernate so that my machine reconnects to an AirVPN server. Hence my bluetit-restart.service which does all of this automatically. The second issue isn't a big deal since I can workaround it with another systemd service and because my Internet connection isn't active at all (no leak) after resuming from suspend/hibernate (without my restart unit). On the other hand, I'm more concerned about the first one. My Linux machine is encrypted so it cannot actually perform the full reboot process until I manually type my LUKS password, but what about another sort of crash that doesn't involve a reboot? Thanks in advance for your help.
  14. Hi Air4141841, I am just resolving, as I didn't do anything fancy to unbound so it should be standard out of the box. I will try your suggestion to upgrade, thanks. Edited to add: I ran the command you suggested on the upgraded routers that are operational, and on both of them got this: Updating pfSense-core repository catalogue... pfSense-core repository is up to date. Updating pfSense repository catalogue... pfSense repository is up to date. All repositories are up to date. Updating pfSense-core repository catalogue... pfSense-core repository is up to date. Updating pfSense repository catalogue... pfSense repository is up to date. All repositories are up to date. Checking for upgrades (0 candidates): . done Processing candidates (0 candidates): . done Checking integrity... done (0 conflicting) Your packages are up to date. Looks like I am all up-to-date.
  15. from the console run: pkg update; pkg upgrade if there are any unbound updates (there probably will be). I recall installing one type the command again with. Y so it will install. are you forwarding or just resolving? I am just using the resolver standard out of the box, and not have any crashes
  16. Hi Air4141841, I have two SG-5100's and two SG-4860's. I did an upgrade from 2.5 to 21.02.2-RELEASE on both SG-4860's and one of the SG-5100's. Now I am seeing the unbound DNS resolver crash issue on both SG-5100's, One of the SG-5100's has AirVPN, while the other one is running a different VPN service. I am also experiencing the DNS resolver crash issue on one of the SG-4860's. As for the second SG-4860, apparently the upgrade was not as successful as it initially appeared because as of this morning it will not even boot due to not being able to find a critical system file. I expect to be contacting Netgate about that shortly. I had rebooted the second SG-4860 several times successfully after the update, but not from being powered off. I am now starting to see posts in the Netgate community board describing this same unbound DNS resolver issue, but none of the posts have cited a likely root cause.
  17. @Staff localhost:~ # nft --version nftables v0.8.2 (Joe Btfsplk) localhost:~ # journalctl | grep bluetit May 16 14:58:04 localhost bluetit[2147]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC4 - 14 May 2021 May 16 14:58:04 localhost bluetit[2147]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit May 16 14:58:04 localhost bluetit[2147]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. May 16 14:58:04 localhost systemd[1]: bluetit.service: PID file /etc/airvpn/bluetit.lock not readable (yet?) after start: No such file or directory May 16 14:58:04 localhost bluetit[2152]: Bluetit daemon started with PID 2152 May 16 14:58:04 localhost bluetit[2152]: External network is reachable via gateway 192.168.178.1 through interface eth0 May 16 14:58:04 localhost bluetit[2152]: Successfully connected to D-Bus May 16 14:58:04 localhost bluetit[2152]: Reading run control directives from file /etc/airvpn/bluetit.rc May 16 14:58:04 localhost bluetit[2152]: IPv6 is available in this system May 16 14:58:04 localhost bluetit[2152]: Bluetit successfully initialized and ready May 16 14:58:04 localhost bluetit[2152]: Requesting network IP and country to AirVPN ipleak.net via secure connection May 16 14:58:04 localhost bluetit[2152]: ERROR: Cannot detect system location: Unknown error: Problem with the SSL CA cert (path? access rights?) May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest updater thread started May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest update interval is 15 minutes May 16 14:58:04 localhost bluetit[2152]: Updating AirVPN Manifest May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest successfully retrieved from server localhost:~ # journalctl | grep bluetit May 16 14:58:04 localhost bluetit[2147]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC4 - 14 May 2021 May 16 14:58:04 localhost bluetit[2147]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit May 16 14:58:04 localhost bluetit[2147]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. May 16 14:58:04 localhost systemd[1]: bluetit.service: PID file /etc/airvpn/bluetit.lock not readable (yet?) after start: No such file or directory May 16 14:58:04 localhost bluetit[2152]: Bluetit daemon started with PID 2152 May 16 14:58:04 localhost bluetit[2152]: External network is reachable via gateway 192.168.178.1 through interface eth0 May 16 14:58:04 localhost bluetit[2152]: Successfully connected to D-Bus May 16 14:58:04 localhost bluetit[2152]: Reading run control directives from file /etc/airvpn/bluetit.rc May 16 14:58:04 localhost bluetit[2152]: IPv6 is available in this system May 16 14:58:04 localhost bluetit[2152]: Bluetit successfully initialized and ready May 16 14:58:04 localhost bluetit[2152]: Requesting network IP and country to AirVPN ipleak.net via secure connection May 16 14:58:04 localhost bluetit[2152]: ERROR: Cannot detect system location: Unknown error: Problem with the SSL CA cert (path? access rights?) May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest updater thread started May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest update interval is 15 minutes May 16 14:58:04 localhost bluetit[2152]: Updating AirVPN Manifest May 16 14:58:04 localhost bluetit[2152]: AirVPN Manifest successfully retrieved from server May 16 15:04:58 localhost bluetit[2152]: Requested method "version" May 16 15:04:58 localhost bluetit[2152]: Requested method "openvpn_info" May 16 15:04:58 localhost bluetit[2152]: Requested method "bluetit_status -> Bluetit is ready" May 16 15:04:58 localhost bluetit[2152]: Requested method "reset_bluetit_options -> Bluetit options successfully reset" May 16 15:04:58 localhost bluetit[2152]: Requested method "set_openvpn_profile -> OK" May 16 15:04:58 localhost bluetit[2152]: Requested method "start_connection" May 16 15:04:58 localhost bluetit[2152]: OpenVPN3 connection successfully started May 16 15:04:58 localhost bluetit[2152]: Network filter and lock are using iptables-legacy May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module iptable_filter May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module iptable_nat May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module iptable_mangle May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module iptable_security May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module iptable_raw May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module ip6table_filter May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module ip6table_nat May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module ip6table_mangle May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module ip6table_security May 16 15:04:58 localhost bluetit[2152]: Successfully loaded kernel module ip6table_raw May 16 15:04:58 localhost bluetit[2152]: WARNING: firewalld is running on this system and may interfere with network filter and lock May 16 15:04:58 localhost bluetit[2152]: Network filter successfully initialized May 16 15:04:58 localhost bluetit[2152]: Starting VPN Connection May 16 15:04:58 localhost bluetit[2152]: OpenVPN3 client successfully created and initialized. May 16 15:04:58 localhost bluetit[2152]: TUN persistence is enabled. May 16 15:04:58 localhost bluetit[2152]: Successfully set OpenVPN3 client configuration May 16 15:04:58 localhost bluetit[2152]: Starting OpenVPN3 connection thread May 16 15:04:58 localhost bluetit[2152]: Connection statistics updater thread started May 16 15:04:58 localhost bluetit[2152]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit May 16 15:04:58 localhost bluetit[2152]: Frame=512/2048/512 mssfix-ctrl=1250 May 16 15:04:58 localhost bluetit[2152]: UNUSED OPTIONS May 16 15:04:58 localhost bluetit[2152]: EVENT: RESOLVE May 16 15:04:58 localhost bluetit[2152]: Local IPv4 address 192.168.178.11 May 16 15:04:58 localhost bluetit[2152]: Local IPv6 address 2001:1c04:509:4000:dd19:6d6d:8993:6ba4 May 16 15:04:58 localhost bluetit[2152]: Local IPv6 address 2001:1c04:509:4000:aaa1:59ff:fe2f:523e May 16 15:04:58 localhost bluetit[2152]: Local IPv6 address fe80::aaa1:59ff:fe2f:523e May 16 15:04:58 localhost bluetit[2152]: Local interface eth0 May 16 15:04:58 localhost bluetit[2152]: Setting up network filter and lock May 16 15:04:58 localhost bluetit[2152]: Allowing system DNS 84.116.46.20 to pass through the network filter May 16 15:04:58 localhost bluetit[2152]: Allowing system DNS 84.116.46.21 to pass through the network filter May 16 15:04:58 localhost bluetit[2152]: ERROR: Cannot allow system DNS to pass through network filter May 16 15:04:58 localhost bluetit[2152]: Resolved server nl3.vpn.airdns.org into IPv4 213.152.161.135 May 16 15:04:58 localhost bluetit[2152]: Adding IPv4 server 213.152.161.135 to network filter May 16 15:04:58 localhost bluetit[2152]: ERROR: Cannot activate network filter and lock May 16 15:04:58 localhost bluetit[2152]: Contacting 213.152.161.135:443 via UDP May 16 15:04:58 localhost bluetit[2152]: EVENT: WAIT May 16 15:04:58 localhost bluetit[2152]: net_route_best_gw query IPv4: 213.152.161.135/32 May 16 15:04:58 localhost bluetit[2152]: sitnl_route_best_gw result: via 192.168.178.1 dev eth0 May 16 15:04:58 localhost bluetit[2152]: net_route_add: 213.152.161.135/32 via 192.168.178.1 dev eth0 table 0 metric 0 May 16 15:04:58 localhost bluetit[2152]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.135) via UDPv4 May 16 15:04:58 localhost bluetit[2152]: EVENT: CONNECTING May 16 15:04:58 localhost bluetit[2152]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysi ze 256,key-method 2,tls-client May 16 15:04:58 localhost bluetit[2152]: Peer Info: May 16 15:04:58 localhost bluetit[2152]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RS A-SHA1 May 16 15:04:58 localhost bluetit[2152]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tarazed/emailAddress=info@airvpn.org, signature: RSA-SHA5 12 May 16 15:04:58 localhost bluetit[2152]: SSL Handshake: peer certificate: CN=Tarazed, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD May 16 15:04:58 localhost bluetit[2152]: Session is ACTIVE May 16 15:04:58 localhost bluetit[2152]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm . Support for SHA1 signatures will be dropped in the future May 16 15:04:58 localhost bluetit[2152]: EVENT: GET_CONFIG May 16 15:04:58 localhost bluetit[2152]: Sending PUSH_REQUEST to server... May 16 15:04:58 localhost bluetit[2152]: OPTIONS: May 16 15:04:58 localhost bluetit[2152]: PROTOCOL OPTIONS: May 16 15:04:58 localhost bluetit[2152]: EVENT: ASSIGN_IP May 16 15:04:58 localhost bluetit[2152]: VPN Server has pushed IPv4 DNS server 10.31.50.1 May 16 15:04:58 localhost bluetit[2152]: Setting pushed IPv4 DNS server 10.31.50.1 in resolv.conf May 16 15:04:58 localhost bluetit[2152]: VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1b32::1 May 16 15:04:58 localhost bluetit[2152]: Setting pushed IPv6 DNS server fde6:7a:7d20:1b32::1 in resolv.conf May 16 15:04:58 localhost bluetit[2152]: net_iface_mtu_set: mtu 1500 for tun0 May 16 15:04:58 localhost bluetit[2152]: net_iface_up: set tun0 up May 16 15:04:58 localhost bluetit[2152]: net_addr_add: 10.31.50.116/24 brd 10.31.50.255 dev tun0 May 16 15:04:58 localhost bluetit[2152]: net_addr_add: fde6:7a:7d20:1b32::1072/64 dev tun0 May 16 15:04:58 localhost bluetit[2152]: net_route_add: 0.0.0.0/1 via 10.31.50.1 dev tun0 table 0 metric 0 May 16 15:04:58 localhost bluetit[2152]: net_route_add: 128.0.0.0/1 via 10.31.50.1 dev tun0 table 0 metric 0 May 16 15:04:58 localhost bluetit[2152]: net_route_add: ::/1 via fde6:7a:7d20:1b32::1 dev tun0 table 0 metric 0 May 16 15:04:58 localhost bluetit[2152]: net_route_add: 8000::/1 via fde6:7a:7d20:1b32::1 dev tun0 table 0 metric 0 May 16 15:04:58 localhost bluetit[2152]: TunPersist: saving tun context: May 16 15:04:58 localhost bluetit[2152]: Connected via tun May 16 15:04:58 localhost bluetit[2152]: LZO-ASYM init swap=0 asym=1 May 16 15:04:58 localhost bluetit[2152]: Comp-stub init swap=0 May 16 15:04:58 localhost bluetit[2152]: EVENT: CONNECTED nl3.vpn.airdns.org:443 (213.152.161.135) via /UDPv4 on tun/10.31.50.116/fde6:7a:7d20:1b32::1072 gw =[10.31.50.1/fde6:7a:7d20:1b32::1] May 16 15:04:58 localhost bluetit[2152]: Server has pushed its own DNS. Removing system DNS from network filter. May 16 15:04:58 localhost bluetit[2152]: System DNS 84.116.46.20 is now rejected by the network filter May 16 15:04:58 localhost bluetit[2152]: System DNS 84.116.46.21 is now rejected by the network filter localhost:~ #
  18. it is personal preference really Chacha is newer and faster depending on. your processor. I have an ARM (sg3100). so I am trying it currently I only have a 100Mb fiber connection, so I can't really max out this CPU... never heard of that issue. as many users including myself, I did a fresh install of Pfsense to remedy other issues faced during an upgrade of 2.4.5
  19. Ok, the today's DEV version fixed it: https://i.imgur.com/yopuUVC.png
  20. Just by reading the Release notes (the 3rd time now) I spotted this: https://redmine.pfsense.org/issues/11805 https://docs.netgate.com/pfsense/en/latest/releases/21-02-2_2-5-1.html
  21. I might try a downgrade by doing a fresh install and importing my previous config. 2.5.0 is available here: https://nyifiles.netgate.com/mirror/downloads/
  22. Thanks @ParnBlade, I was just about to re-do my setup with the mentioned guide, but if you have already tried it I will leave it as it is. Do you think this is something AirVPN could help with ? Or is this a bug in the pfSense config ? I found that the support forum of pfSense isn't really supportive when it comes to VPN configuration with any 3rd Party vendor.
  23. Hello, same things happen to my setup. pfSense 2.5.0 with config for Airvpn tuto = port forwarding work // upgrade pfSense 2.5.1 port forwarding KO Test with config from https://nguvu.org same things Test with last version of OPNsense same thing. It's seems that there is a problème a top of the tunnel vpn. I continu to test
  24. Hi guys, I'm running my pfSense setup since a long while and recently I've upgraded to the 2.5.1 release. After that I've noticed that port forwarding stopped working. It looks like the Firewall and NAT does what it should. I'm a bit lost... any ideas ?
  25. @John Gow Hello! It looks like more a "picking the right server for you" problem than an overload or load balancing problem. We also don't see any overload in US or CA West Coast. Can you define a while list of your favorite servers? It should meet your needs. You can define the list in Eddie's "Preferences" > "Servers" window. Multiple selection (CTRL + click and SHIFT + click) is allowed for your comfort. Once a white list is defined, Eddie will consider only servers in that white list. Kind regards
  26. Hello! @colorman Goldcrest invocation appears correct. The full Bluetit log might be more helpful, can you please publish it? Also, can you tell us your nft version (command "nft --version")? @183aTr78f9o The 1st reported behavior is expected. because Bluetit must not proceed when it is in a "dirty condition", but it remains to be seen why Bluetit did not exit cleanly in its last session. Was it intended as a test (i.e. you explicitly wanted a dirty startup to test), or is it unexpected? (OK, you already wrote it was a test ). Once you have issued goldcrest --recover-network you don't need to restart Bluetit, you can directly start a connection. Also, Bluetit will activate network lock immediately after a network recovery, if networklockpersist is set in bluetit.rc - another good reason to avoid a restart. The 2nd remark describes an unexpected event. What happens after you resume the system? Can you send us the full Bluetit log taken just after the problem has occurred? The expected behavior would be that Bluetit daemon does not exit at all, in the first place, when you order an hibernation. Let's see what kills it, if possible. @leori Thank you, we're very glad to know it! @air2157 We're glad to know that Hummingbird launch by Eddie is fine again. As explained, up and down scripts with script-security 2 enlarge attack surface and we think that it's very appropriate that a library and a root process (Hummingbird) do not offer them. Even in Eddie, script-security, up and down custom directives have been forbidden a long ago for critical security reasons. Furthermore Eddie does not even allow you to use an arbitrary external ovpn profile, and we're considering to stop supporting it in Goldcrest/Bluetit too. About the documentation: please note that, just like it happens with any documentation, we document implemented features, not unimplemented ones. Bluetit developer's documentation is also on its way and we plan to publish it immediately after AirVPN Suite 1.1.0 stable has been released. As you know we have forked OpenVPN3 so we don't need to wait for bug fixes from the main branch if they are too slow to come or they are urgent. The parts which were not ready for production in our tests have been fixed and/or rewritten already, as these last 3 years of releases and testing in different systems should have shown. In any case, please feel free to point us to those source code parts that you deem as not ready for production at your convenience. Thank you for your previous tests, they have been much appreciated. Kind regards
  27. Hi Thanks for te help. Telia in sweden is the provider. Eddie System/Environment Report - 5/16/2021 - 9:20 AM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows Server 2016 Standard OS version: Microsoft Windows NT 10.0.14393.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: 0.8 OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\infodba\AppData\Local\Eddie\default.profile Data path: C:\Users\infodba\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Capricornus Detected DNS: 10.12.170.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 2326 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True network.entry.iplayer: ipv4-only network.ipv6.mode: block network.ipv4.autoswitch: True ---------------------------- Logs: . 2021.05.14 11:22:06 - OpenVPN > interactive service msg_channel=0 . 2021.05.14 11:22:06 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.14 11:22:06 - OpenVPN > open_tun . 2021.05.14 11:22:07 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.14 11:22:07 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.14 11:22:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.202.0/10.19.202.113/255.255.255.0 [SUCCEEDED] . 2021.05.14 11:22:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.202.113/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.19.202.254, lease-time: 31536000] . 2021.05.14 11:22:07 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.14 11:22:07 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.14 11:22:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.14 11:22:11 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.186.26 MASK 255.255.255.255 172.16.186.1 . 2021.05.14 11:22:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.14 11:22:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.14 11:22:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.202.1 . 2021.05.14 11:22:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.14 11:22:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.14 11:22:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.202.1 . 2021.05.14 11:22:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.14 11:22:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.14 11:22:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.14 11:22:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.14 11:22:11 - DNS leak protection with packet filtering enabled. . 2021.05.14 11:22:11 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.19.202.1) . 2021.05.14 11:22:11 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.19.202.1) . 2021.05.14 11:22:11 - Routes, added a new route, 213.152.186.24 for gateway 10.19.202.1 . 2021.05.14 11:22:11 - Unable to compute route for 2a00:1678:1337:1936:cf8c:6738:e8ee:6fcf: IPv6 VPN gateway not available. . 2021.05.14 11:22:11 - Flushing DNS I 2021.05.14 11:22:11 - Checking route IPv4 I 2021.05.14 11:22:13 - Checking DNS ! 2021.05.14 11:22:13 - Connected. . 2021.05.14 11:22:13 - OpenVPN > Initialization Sequence Completed . 2021.05.15 09:24:00 - OpenVPN > [Jabbah] Inactivity timeout (--ping-restart), restarting . 2021.05.15 09:24:00 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.15 09:24:00 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.15 09:24:00 - Disconnecting . 2021.05.15 09:24:00 - Routes, removed a route previously added, 213.152.186.24 for gateway 10.19.202.1 . 2021.05.15 09:24:00 - Sending soft termination signal . 2021.05.15 09:24:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.186.26 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 09:24:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 09:24:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.202.1 . 2021.05.15 09:24:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 09:24:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.202.1 . 2021.05.15 09:24:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 09:24:05 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 09:24:05 - OpenVPN > TAP: DHCP address released . 2021.05.15 09:24:05 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.15 09:24:05 - Connection terminated. . 2021.05.15 09:24:05 - IPv6 restored with packet filtering. . 2021.05.15 09:24:05 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 09:24:05 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 09:24:05 - DNS leak protection with packet filtering disabled. . 2021.05.15 09:24:05 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 09:24:05 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2021.05.15 09:24:09 - Checking authorization ... . 2021.05.15 09:24:09 - IPv6 disabled with packet filtering. ! 2021.05.15 09:24:09 - Connecting to Atik (Netherlands, Alblasserdam) . 2021.05.15 09:24:09 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.15 09:24:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.15 09:24:09 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.15 09:24:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 09:24:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 09:24:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 09:24:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 09:24:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.12:443 . 2021.05.15 09:24:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.15 09:24:09 - OpenVPN > UDP link local: (not bound) . 2021.05.15 09:24:09 - OpenVPN > UDP link remote: [AF_INET]213.152.161.12:443 . 2021.05.15 09:24:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.12:443, sid=3054d682 f254abcd . 2021.05.15 09:24:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 09:24:09 - OpenVPN > VERIFY KU OK . 2021.05.15 09:24:09 - OpenVPN > Validating certificate extended key usage . 2021.05.15 09:24:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 09:24:09 - OpenVPN > VERIFY EKU OK . 2021.05.15 09:24:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Atik, emailAddress=info@airvpn.org . 2021.05.15 09:24:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.15 09:24:09 - OpenVPN > [Atik] Peer Connection Initiated with [AF_INET]213.152.161.12:443 . 2021.05.15 09:24:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.106.1,dhcp-option DNS6 fde6:7a:7d20:66a::1,tun-ipv6,route-gateway 10.10.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:66a::10e6/64 fde6:7a:7d20:66a::1,ifconfig 10.10.106.232 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.15 09:24:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.15 09:24:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:66a::1' . 2021.05.15 09:24:09 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.15 09:24:09 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:66a::10e6/64 fde6:7a:7d20:66a::1' . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.15 09:24:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.15 09:24:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.15 09:24:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 09:24:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 09:24:09 - OpenVPN > interactive service msg_channel=0 . 2021.05.15 09:24:09 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.15 09:24:09 - OpenVPN > open_tun . 2021.05.15 09:24:10 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.15 09:24:10 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.15 09:24:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.10.106.0/10.10.106.232/255.255.255.0 [SUCCEEDED] . 2021.05.15 09:24:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.106.232/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.10.106.254, lease-time: 31536000] . 2021.05.15 09:24:10 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.15 09:24:10 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.15 09:24:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.15 09:24:14 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.12 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 09:24:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 09:24:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 09:24:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.10.106.1 . 2021.05.15 09:24:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 09:24:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 09:24:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.10.106.1 . 2021.05.15 09:24:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 09:24:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 09:24:14 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.15 09:24:14 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.15 09:24:14 - DNS leak protection with packet filtering enabled. . 2021.05.15 09:24:14 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.10.106.1) . 2021.05.15 09:24:14 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.10.106.1) . 2021.05.15 09:24:14 - Routes, added a new route, 213.152.161.10 for gateway 10.10.106.1 . 2021.05.15 09:24:14 - Unable to compute route for 2a00:1678:2470:38:172e:6bff:5dbb:b0ae: IPv6 VPN gateway not available. . 2021.05.15 09:24:14 - Flushing DNS I 2021.05.15 09:24:14 - Checking route IPv4 I 2021.05.15 09:24:15 - Checking DNS ! 2021.05.15 09:24:15 - Connected. . 2021.05.15 09:24:15 - OpenVPN > Initialization Sequence Completed . 2021.05.15 09:49:36 - Collect information about AirVPN completed . 2021.05.15 12:08:50 - OpenVPN > [Atik] Inactivity timeout (--ping-restart), restarting . 2021.05.15 12:08:50 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.15 12:08:50 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.15 12:08:51 - Disconnecting . 2021.05.15 12:08:51 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2021.05.15 12:08:51 - Routes, removed a route previously added, 213.152.161.10 for gateway 10.10.106.1 . 2021.05.15 12:08:51 - Sending soft termination signal . 2021.05.15 12:08:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.12 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 12:08:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 12:08:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.10.106.1 . 2021.05.15 12:08:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 12:08:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.10.106.1 . 2021.05.15 12:08:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 12:08:55 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 12:08:55 - OpenVPN > TAP: DHCP address released . 2021.05.15 12:08:55 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.15 12:08:55 - Connection terminated. . 2021.05.15 12:08:55 - IPv6 restored with packet filtering. . 2021.05.15 12:08:56 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 12:08:56 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 12:08:56 - DNS leak protection with packet filtering disabled. . 2021.05.15 12:08:56 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 12:08:56 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.15 12:08:59 - Waiting for latency tests (240 to go) . 2021.05.15 12:09:00 - Waiting for latency tests (165 to go) . 2021.05.15 12:09:01 - Waiting for latency tests (115 to go) . 2021.05.15 12:09:02 - Waiting for latency tests (40 to go) . 2021.05.15 12:09:03 - Waiting for latency tests (3 to go) I 2021.05.15 12:09:06 - Checking authorization ... . 2021.05.15 12:09:07 - IPv6 disabled with packet filtering. ! 2021.05.15 12:09:07 - Connecting to Alzirr (Netherlands, Alblasserdam) . 2021.05.15 12:09:07 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.15 12:09:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.15 12:09:07 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.15 12:09:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 12:09:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 12:09:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 12:09:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 12:09:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.207:443 . 2021.05.15 12:09:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.15 12:09:07 - OpenVPN > UDP link local: (not bound) . 2021.05.15 12:09:07 - OpenVPN > UDP link remote: [AF_INET]213.152.187.207:443 . 2021.05.15 12:09:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.207:443, sid=c52122e7 4f6410d9 . 2021.05.15 12:09:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 12:09:07 - OpenVPN > VERIFY KU OK . 2021.05.15 12:09:07 - OpenVPN > Validating certificate extended key usage . 2021.05.15 12:09:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 12:09:07 - OpenVPN > VERIFY EKU OK . 2021.05.15 12:09:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alzirr, emailAddress=info@airvpn.org . 2021.05.15 12:09:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.15 12:09:07 - OpenVPN > [Alzirr] Peer Connection Initiated with [AF_INET]213.152.187.207:443 . 2021.05.15 12:09:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.202.1,dhcp-option DNS6 fde6:7a:7d20:4ca::1,tun-ipv6,route-gateway 10.8.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4ca::100b/64 fde6:7a:7d20:4ca::1,ifconfig 10.8.202.13 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2021.05.15 12:09:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.15 12:09:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4ca::1' . 2021.05.15 12:09:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.15 12:09:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:4ca::100b/64 fde6:7a:7d20:4ca::1' . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.15 12:09:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.15 12:09:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.15 12:09:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 12:09:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 12:09:07 - OpenVPN > interactive service msg_channel=0 . 2021.05.15 12:09:07 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.15 12:09:07 - OpenVPN > open_tun . 2021.05.15 12:09:07 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.15 12:09:07 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.15 12:09:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.202.0/10.8.202.13/255.255.255.0 [SUCCEEDED] . 2021.05.15 12:09:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.202.13/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.8.202.254, lease-time: 31536000] . 2021.05.15 12:09:07 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.15 12:09:07 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.15 12:09:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.15 12:09:12 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.187.207 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 12:09:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 12:09:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 12:09:12 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.202.1 . 2021.05.15 12:09:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 12:09:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 12:09:12 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.202.1 . 2021.05.15 12:09:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 12:09:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 12:09:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.15 12:09:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.15 12:09:12 - DNS leak protection with packet filtering enabled. . 2021.05.15 12:09:12 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.8.202.1) . 2021.05.15 12:09:12 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.8.202.1) . 2021.05.15 12:09:12 - Routes, added a new route, 213.152.187.205 for gateway 10.8.202.1 . 2021.05.15 12:09:12 - Unable to compute route for 2a00:1678:1337:7a20:5bfe:98a:a67c:3dd3: IPv6 VPN gateway not available. . 2021.05.15 12:09:12 - Flushing DNS I 2021.05.15 12:09:12 - Checking route IPv4 I 2021.05.15 12:09:12 - Checking DNS ! 2021.05.15 12:09:13 - Connected. . 2021.05.15 12:09:13 - OpenVPN > Initialization Sequence Completed . 2021.05.15 15:47:47 - OpenVPN > [Alzirr] Inactivity timeout (--ping-restart), restarting . 2021.05.15 15:47:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.15 15:47:47 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.15 15:47:47 - Disconnecting . 2021.05.15 15:47:48 - Routes, removed a route previously added, 213.152.187.205 for gateway 10.8.202.1 . 2021.05.15 15:47:48 - Sending soft termination signal . 2021.05.15 15:47:48 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2021.05.15 15:47:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.187.207 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 15:47:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 15:47:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.202.1 . 2021.05.15 15:47:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 15:47:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.202.1 . 2021.05.15 15:47:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 15:47:51 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 15:47:51 - OpenVPN > TAP: DHCP address released . 2021.05.15 15:47:51 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.15 15:47:51 - Connection terminated. . 2021.05.15 15:47:51 - IPv6 restored with packet filtering. . 2021.05.15 15:47:52 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 15:47:52 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 15:47:52 - DNS leak protection with packet filtering disabled. . 2021.05.15 15:47:52 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 15:47:52 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.15 15:47:55 - Waiting for latency tests (240 to go) . 2021.05.15 15:47:56 - Waiting for latency tests (190 to go) . 2021.05.15 15:47:57 - Waiting for latency tests (140 to go) . 2021.05.15 15:47:58 - Waiting for latency tests (116 to go) . 2021.05.15 15:47:59 - Waiting for latency tests (68 to go) . 2021.05.15 15:48:00 - Waiting for latency tests (43 to go) . 2021.05.15 15:48:01 - Waiting for latency tests (41 to go) . 2021.05.15 15:48:02 - Waiting for latency tests (40 to go) . 2021.05.15 15:48:03 - Waiting for latency tests (17 to go) . 2021.05.15 15:48:06 - Waiting for latency tests (3 to go) . 2021.05.15 15:48:10 - Waiting for latency tests (1 to go) I 2021.05.15 15:48:11 - Checking authorization ... . 2021.05.15 15:48:11 - IPv6 disabled with packet filtering. ! 2021.05.15 15:48:11 - Connecting to Phaet (Netherlands, Alblasserdam) . 2021.05.15 15:48:11 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.15 15:48:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.15 15:48:11 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.15 15:48:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 15:48:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 15:48:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 15:48:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 15:48:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.232:443 . 2021.05.15 15:48:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.15 15:48:11 - OpenVPN > UDP link local: (not bound) . 2021.05.15 15:48:11 - OpenVPN > UDP link remote: [AF_INET]213.152.187.232:443 . 2021.05.15 15:48:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.232:443, sid=76bdd7cf 1d25d9fc . 2021.05.15 15:48:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 15:48:11 - OpenVPN > VERIFY KU OK . 2021.05.15 15:48:11 - OpenVPN > Validating certificate extended key usage . 2021.05.15 15:48:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 15:48:11 - OpenVPN > VERIFY EKU OK . 2021.05.15 15:48:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Phaet, emailAddress=info@airvpn.org . 2021.05.15 15:48:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.15 15:48:11 - OpenVPN > [Phaet] Peer Connection Initiated with [AF_INET]213.152.187.232:443 . 2021.05.15 15:48:12 - OpenVPN > SENT CONTROL [Phaet]: 'PUSH_REQUEST' (status=1) . 2021.05.15 15:48:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.202.1,dhcp-option DNS6 fde6:7a:7d20:16ca::1,tun-ipv6,route-gateway 10.26.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:16ca::102a/64 fde6:7a:7d20:16ca::1,ifconfig 10.26.202.44 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2021.05.15 15:48:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.15 15:48:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:16ca::1' . 2021.05.15 15:48:12 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.15 15:48:12 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:16ca::102a/64 fde6:7a:7d20:16ca::1' . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.15 15:48:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.15 15:48:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.15 15:48:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 15:48:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 15:48:12 - OpenVPN > interactive service msg_channel=0 . 2021.05.15 15:48:12 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.15 15:48:12 - OpenVPN > open_tun . 2021.05.15 15:48:12 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.15 15:48:12 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.15 15:48:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.26.202.0/10.26.202.44/255.255.255.0 [SUCCEEDED] . 2021.05.15 15:48:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.26.202.44/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.26.202.254, lease-time: 31536000] . 2021.05.15 15:48:12 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.15 15:48:12 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.15 15:48:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.15 15:48:17 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.187.232 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 15:48:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 15:48:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 15:48:17 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.26.202.1 . 2021.05.15 15:48:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 15:48:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 15:48:17 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.26.202.1 . 2021.05.15 15:48:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 15:48:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 15:48:17 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.15 15:48:17 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.15 15:48:17 - DNS leak protection with packet filtering enabled. . 2021.05.15 15:48:17 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.26.202.1) . 2021.05.15 15:48:17 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.26.202.1) . 2021.05.15 15:48:17 - Routes, added a new route, 213.152.187.230 for gateway 10.26.202.1 . 2021.05.15 15:48:17 - Unable to compute route for 2a00:1678:1337:7a25:5123:8f18:de5a:4ff3: IPv6 VPN gateway not available. . 2021.05.15 15:48:17 - Flushing DNS I 2021.05.15 15:48:18 - Checking route IPv4 I 2021.05.15 15:48:18 - Checking DNS ! 2021.05.15 15:48:18 - Connected. . 2021.05.15 15:48:18 - OpenVPN > Initialization Sequence Completed ! 2021.05.15 16:00:18 - Disconnecting . 2021.05.15 16:00:18 - Routes, removed a route previously added, 213.152.187.230 for gateway 10.26.202.1 . 2021.05.15 16:00:18 - Sending soft termination signal . 2021.05.15 16:00:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.15 16:00:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.187.232 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 16:00:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 16:00:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.26.202.1 . 2021.05.15 16:00:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 16:00:23 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.26.202.1 . 2021.05.15 16:00:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 16:00:23 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 16:00:23 - OpenVPN > TAP: DHCP address released . 2021.05.15 16:00:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.15 16:00:23 - Connection terminated. . 2021.05.15 16:00:23 - IPv6 restored with packet filtering. . 2021.05.15 16:00:23 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 16:00:23 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 16:00:23 - DNS leak protection with packet filtering disabled. . 2021.05.15 16:00:23 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 16:00:23 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.15 16:00:23 - Flushing DNS ! 2021.05.15 16:00:23 - Session terminated. I 2021.05.15 16:00:25 - Session starting. I 2021.05.15 16:00:25 - Checking authorization ... . 2021.05.15 16:00:26 - IPv6 disabled with packet filtering. ! 2021.05.15 16:00:26 - Connecting to Diphda (Netherlands, Alblasserdam) . 2021.05.15 16:00:26 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.15 16:00:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.15 16:00:26 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.15 16:00:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 16:00:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 16:00:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 16:00:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 16:00:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.167:443 . 2021.05.15 16:00:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.15 16:00:26 - OpenVPN > UDP link local: (not bound) . 2021.05.15 16:00:26 - OpenVPN > UDP link remote: [AF_INET]213.152.161.167:443 . 2021.05.15 16:00:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.167:443, sid=f0f83d2b 4b282fa3 . 2021.05.15 16:00:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 16:00:26 - OpenVPN > VERIFY KU OK . 2021.05.15 16:00:26 - OpenVPN > Validating certificate extended key usage . 2021.05.15 16:00:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 16:00:26 - OpenVPN > VERIFY EKU OK . 2021.05.15 16:00:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diphda, emailAddress=info@airvpn.org . 2021.05.15 16:00:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.15 16:00:26 - OpenVPN > [Diphda] Peer Connection Initiated with [AF_INET]213.152.161.167:443 . 2021.05.15 16:00:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.202.1,dhcp-option DNS6 fde6:7a:7d20:bca::1,tun-ipv6,route-gateway 10.15.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bca::10c0/64 fde6:7a:7d20:bca::1,ifconfig 10.15.202.194 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2021.05.15 16:00:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.15 16:00:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bca::1' . 2021.05.15 16:00:26 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.15 16:00:26 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:bca::10c0/64 fde6:7a:7d20:bca::1' . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.15 16:00:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.15 16:00:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.15 16:00:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 16:00:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 16:00:26 - OpenVPN > interactive service msg_channel=0 . 2021.05.15 16:00:26 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.15 16:00:26 - OpenVPN > open_tun . 2021.05.15 16:00:26 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.15 16:00:26 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.15 16:00:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.202.0/10.15.202.194/255.255.255.0 [SUCCEEDED] . 2021.05.15 16:00:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.202.194/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.15.202.254, lease-time: 31536000] . 2021.05.15 16:00:26 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.15 16:00:26 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.15 16:00:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.15 16:00:31 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.167 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 16:00:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 16:00:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 16:00:31 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.202.1 . 2021.05.15 16:00:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 16:00:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 16:00:31 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.202.1 . 2021.05.15 16:00:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 16:00:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 16:00:31 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.15 16:00:31 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.15 16:00:31 - DNS leak protection with packet filtering enabled. . 2021.05.15 16:00:31 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.15.202.1) . 2021.05.15 16:00:31 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.15.202.1) . 2021.05.15 16:00:31 - Routes, added a new route, 213.152.161.165 for gateway 10.15.202.1 . 2021.05.15 16:00:31 - Unable to compute route for 2a00:1678:2470:1:6a8f:b6ec:1a19:e76d: IPv6 VPN gateway not available. . 2021.05.15 16:00:31 - Flushing DNS I 2021.05.15 16:00:31 - Checking route IPv4 I 2021.05.15 16:00:32 - Checking DNS ! 2021.05.15 16:00:32 - Connected. . 2021.05.15 16:00:32 - OpenVPN > Initialization Sequence Completed . 2021.05.15 16:17:59 - Collect information about AirVPN completed . 2021.05.15 16:57:05 - Above log line repeated 1 times more . 2021.05.15 16:57:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 16:57:05 - OpenVPN > VERIFY KU OK . 2021.05.15 16:57:05 - OpenVPN > Validating certificate extended key usage . 2021.05.15 16:57:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 16:57:05 - OpenVPN > VERIFY EKU OK . 2021.05.15 16:57:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diphda, emailAddress=info@airvpn.org . 2021.05.15 16:57:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 16:57:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 16:57:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:25:53 - OpenVPN > [Diphda] Inactivity timeout (--ping-restart), restarting . 2021.05.16 10:25:53 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.16 10:25:53 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.16 10:25:53 - Disconnecting . 2021.05.16 10:25:53 - Routes, removed a route previously added, 213.152.161.165 for gateway 10.15.202.1 . 2021.05.16 10:25:53 - Sending soft termination signal . 2021.05.16 10:25:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.167 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:25:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:25:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.202.1 . 2021.05.16 10:25:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:25:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.202.1 . 2021.05.16 10:25:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:25:58 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 10:25:58 - OpenVPN > TAP: DHCP address released . 2021.05.16 10:25:58 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.16 10:25:58 - Connection terminated. . 2021.05.16 10:25:58 - IPv6 restored with packet filtering. . 2021.05.16 10:25:58 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 10:25:58 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.16 10:25:58 - DNS leak protection with packet filtering disabled. . 2021.05.16 10:25:58 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 10:25:58 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.16 10:25:59 - Collect information about AirVPN completed . 2021.05.16 10:26:01 - Waiting for latency tests (239 to go) . 2021.05.16 10:26:02 - Waiting for latency tests (214 to go) . 2021.05.16 10:26:03 - Waiting for latency tests (158 to go) . 2021.05.16 10:26:04 - Waiting for latency tests (135 to go) . 2021.05.16 10:26:06 - Waiting for latency tests (89 to go) . 2021.05.16 10:26:07 - Waiting for latency tests (54 to go) . 2021.05.16 10:26:08 - Waiting for latency tests (34 to go) . 2021.05.16 10:26:09 - Waiting for latency tests (14 to go) . 2021.05.16 10:26:10 - Waiting for latency tests (3 to go) I 2021.05.16 10:26:13 - Checking authorization ... . 2021.05.16 10:26:13 - IPv6 disabled with packet filtering. ! 2021.05.16 10:26:13 - Connecting to Kajam (Netherlands, Alblasserdam) . 2021.05.16 10:26:14 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 10:26:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 10:26:14 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 10:26:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:26:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:26:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:26:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:26:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2021.05.16 10:26:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 10:26:14 - OpenVPN > UDP link local: (not bound) . 2021.05.16 10:26:14 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443 . 2021.05.16 10:26:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=670cbb5b 2accd5e0 . 2021.05.16 10:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 10:26:14 - OpenVPN > VERIFY KU OK . 2021.05.16 10:26:14 - OpenVPN > Validating certificate extended key usage . 2021.05.16 10:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 10:26:14 - OpenVPN > VERIFY EKU OK . 2021.05.16 10:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org . 2021.05.16 10:26:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:26:14 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443 . 2021.05.16 10:26:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.234.1,dhcp-option DNS6 fde6:7a:7d20:fea::1,tun-ipv6,route-gateway 10.19.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fea::10a1/64 fde6:7a:7d20:fea::1,ifconfig 10.19.234.163 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2021.05.16 10:26:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 10:26:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fea::1' . 2021.05.16 10:26:14 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.16 10:26:14 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:fea::10a1/64 fde6:7a:7d20:fea::1' . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 10:26:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 10:26:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 10:26:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:26:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:26:14 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 10:26:14 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.16 10:26:14 - OpenVPN > open_tun . 2021.05.16 10:26:14 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 10:26:14 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 10:26:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.234.0/10.19.234.163/255.255.255.0 [SUCCEEDED] . 2021.05.16 10:26:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.234.163/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.19.234.254, lease-time: 31536000] . 2021.05.16 10:26:14 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.16 10:26:14 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.16 10:26:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 10:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.87 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.234.1 . 2021.05.16 10:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.234.1 . 2021.05.16 10:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:26:19 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 10:26:19 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 10:26:19 - DNS leak protection with packet filtering enabled. . 2021.05.16 10:26:19 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.19.234.1) . 2021.05.16 10:26:19 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.19.234.1) . 2021.05.16 10:26:19 - Routes, added a new route, 213.152.161.85 for gateway 10.19.234.1 . 2021.05.16 10:26:19 - Unable to compute route for 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e: IPv6 VPN gateway not available. . 2021.05.16 10:26:19 - Flushing DNS I 2021.05.16 10:26:19 - Checking route IPv4 I 2021.05.16 10:26:20 - Checking DNS ! 2021.05.16 10:26:20 - Connected. . 2021.05.16 10:26:20 - OpenVPN > Initialization Sequence Completed . 2021.05.16 10:27:53 - OpenVPN > [Kajam] Inactivity timeout (--ping-restart), restarting . 2021.05.16 10:27:53 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2021.05.16 10:27:53 - OpenVPN > Restart pause, 5 second(s) ! 2021.05.16 10:27:53 - Disconnecting . 2021.05.16 10:27:53 - Routes, removed a route previously added, 213.152.161.85 for gateway 10.19.234.1 . 2021.05.16 10:27:53 - Sending soft termination signal . 2021.05.15 17:06:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.87 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 17:06:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:06:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.234.1 . 2021.05.15 17:06:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:06:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.234.1 . 2021.05.15 17:06:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:06:55 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 17:06:55 - OpenVPN > TAP: DHCP address released . 2021.05.15 17:06:55 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2021.05.15 17:06:55 - Connection terminated. . 2021.05.15 17:06:55 - IPv6 restored with packet filtering. . 2021.05.15 17:06:55 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 17:06:55 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 17:06:55 - DNS leak protection with packet filtering disabled. . 2021.05.15 17:06:55 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 17:06:55 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2021.05.15 17:06:58 - Checking authorization ... . 2021.05.15 17:06:59 - IPv6 disabled with packet filtering. ! 2021.05.15 17:06:59 - Connecting to Zibal (Netherlands, Alblasserdam) . 2021.05.15 17:06:59 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.15 17:06:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.15 17:06:59 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.15 17:06:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 17:06:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 17:06:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.15 17:06:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.15 17:06:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.151:443 . 2021.05.15 17:06:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.15 17:06:59 - OpenVPN > UDP link local: (not bound) . 2021.05.15 17:06:59 - OpenVPN > UDP link remote: [AF_INET]213.152.161.151:443 . 2021.05.15 17:06:59 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.151:443, sid=d37b5a04 dce3fcc0 . 2021.05.15 17:06:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.15 17:06:59 - OpenVPN > VERIFY KU OK . 2021.05.15 17:06:59 - OpenVPN > Validating certificate extended key usage . 2021.05.15 17:06:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.15 17:06:59 - OpenVPN > VERIFY EKU OK . 2021.05.15 17:06:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Zibal, emailAddress=info@airvpn.org . 2021.05.15 17:06:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.15 17:06:59 - OpenVPN > [Zibal] Peer Connection Initiated with [AF_INET]213.152.161.151:443 . 2021.05.15 17:06:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.234.1,dhcp-option DNS6 fde6:7a:7d20:1cea::1,tun-ipv6,route-gateway 10.32.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1cea::106e/64 fde6:7a:7d20:1cea::1,ifconfig 10.32.234.112 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2021.05.15 17:06:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.15 17:06:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1cea::1' . 2021.05.15 17:06:59 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.15 17:06:59 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1cea::106e/64 fde6:7a:7d20:1cea::1' . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.15 17:06:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.15 17:06:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.15 17:06:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 17:06:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.15 17:06:59 - OpenVPN > interactive service msg_channel=0 . 2021.05.15 17:06:59 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.15 17:06:59 - OpenVPN > open_tun . 2021.05.15 17:06:59 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.15 17:06:59 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.15 17:06:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.234.0/10.32.234.112/255.255.255.0 [SUCCEEDED] . 2021.05.15 17:06:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.234.112/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.32.234.254, lease-time: 31536000] . 2021.05.15 17:06:59 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.15 17:06:59 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() ! 2021.05.15 17:07:01 - Disconnecting . 2021.05.15 17:07:01 - Sending soft termination signal . 2021.05.15 17:07:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.15 17:07:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.15 17:07:04 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.151 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 17:07:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 17:07:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 17:07:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.234.1 . 2021.05.15 17:07:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 17:07:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 17:07:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.234.1 . 2021.05.15 17:07:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.15 17:07:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.15 17:07:04 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.15 17:07:04 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.15 17:07:04 - DNS leak protection with packet filtering enabled. . 2021.05.15 17:07:05 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.32.234.1) . 2021.05.15 17:07:05 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.32.234.1) . 2021.05.15 17:07:05 - Routes, restored a previously deleted route, 213.152.161.149 for gateway 10.32.234.1 . 2021.05.15 17:07:05 - Unable to compute route for 2a00:1678:2470:3:7777:3622:2fe6:5066: IPv6 VPN gateway not available. . 2021.05.15 17:07:05 - Flushing DNS . 2021.05.15 17:07:05 - OpenVPN > Initialization Sequence Completed . 2021.05.15 17:07:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.151 MASK 255.255.255.255 172.16.186.1 . 2021.05.15 17:07:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:07:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.32.234.1 . 2021.05.15 17:07:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:07:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.32.234.1 . 2021.05.15 17:07:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.15 17:07:06 - OpenVPN > Closing TUN/TAP interface . 2021.05.15 17:07:06 - OpenVPN > TAP: DHCP address released . 2021.05.15 17:07:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.15 17:07:06 - Connection terminated. . 2021.05.15 17:07:06 - IPv6 restored with packet filtering. . 2021.05.15 17:07:06 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.15 17:07:06 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.15 17:07:06 - DNS leak protection with packet filtering disabled. . 2021.05.15 17:07:06 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.15 17:07:06 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.15 17:07:06 - Flushing DNS ! 2021.05.15 17:07:06 - Session terminated. I 2021.05.16 10:32:36 - Session starting. I 2021.05.16 10:32:36 - Checking authorization ... . 2021.05.16 10:32:37 - IPv6 disabled with packet filtering. ! 2021.05.16 10:32:37 - Connecting to Pleione (Netherlands, Alblasserdam) . 2021.05.16 10:32:37 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 10:32:37 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 10:32:37 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 10:32:37 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:32:37 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:32:37 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:32:37 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:32:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.151:443 . 2021.05.16 10:32:37 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 10:32:37 - OpenVPN > UDP link local: (not bound) . 2021.05.16 10:32:37 - OpenVPN > UDP link remote: [AF_INET]213.152.162.151:443 . 2021.05.16 10:32:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.151:443, sid=acd98009 d6a112c0 . 2021.05.16 10:32:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 10:32:37 - OpenVPN > VERIFY KU OK . 2021.05.16 10:32:37 - OpenVPN > Validating certificate extended key usage . 2021.05.16 10:32:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 10:32:37 - OpenVPN > VERIFY EKU OK . 2021.05.16 10:32:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pleione, emailAddress=info@airvpn.org . 2021.05.16 10:32:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:32:37 - OpenVPN > [Pleione] Peer Connection Initiated with [AF_INET]213.152.162.151:443 . 2021.05.16 10:32:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.42.1,dhcp-option DNS6 fde6:7a:7d20:172a::1,tun-ipv6,route-gateway 10.27.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:172a::10f3/64 fde6:7a:7d20:172a::1,ifconfig 10.27.42.245 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2021.05.16 10:32:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 10:32:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:172a::1' . 2021.05.16 10:32:37 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.16 10:32:37 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:172a::10f3/64 fde6:7a:7d20:172a::1' . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 10:32:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 10:32:37 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 10:32:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:32:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:32:37 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 10:32:37 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.16 10:32:37 - OpenVPN > open_tun . 2021.05.16 10:32:37 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 10:32:37 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 10:32:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.42.0/10.27.42.245/255.255.255.0 [SUCCEEDED] . 2021.05.16 10:32:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.42.245/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.27.42.254, lease-time: 31536000] . 2021.05.16 10:32:37 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.16 10:32:37 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.16 10:32:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 10:32:42 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.151 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:32:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:32:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:32:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.42.1 . 2021.05.16 10:32:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:32:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:32:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.42.1 . 2021.05.16 10:32:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:32:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:32:42 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 10:32:42 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 10:32:42 - DNS leak protection with packet filtering enabled. . 2021.05.16 10:32:42 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.27.42.1) . 2021.05.16 10:32:43 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.27.42.1) . 2021.05.16 10:32:43 - Routes, added a new route, 213.152.162.149 for gateway 10.27.42.1 . 2021.05.16 10:32:43 - Unable to compute route for 2a00:1678:2470:8:c4b8:80bc:94d9:951b: IPv6 VPN gateway not available. . 2021.05.16 10:32:43 - Flushing DNS I 2021.05.16 10:32:43 - Checking route IPv4 I 2021.05.16 10:32:43 - Checking DNS ! 2021.05.16 10:32:43 - Connected. . 2021.05.16 10:32:43 - OpenVPN > Initialization Sequence Completed ! 2021.05.16 10:41:34 - Disconnecting . 2021.05.16 10:41:34 - Routes, removed a route previously added, 213.152.162.149 for gateway 10.27.42.1 . 2021.05.16 10:41:34 - Sending soft termination signal . 2021.05.16 10:41:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.16 10:41:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.151 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:41:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:41:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.42.1 . 2021.05.16 10:41:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:41:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.42.1 . 2021.05.16 10:41:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:41:39 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 10:41:39 - OpenVPN > TAP: DHCP address released . 2021.05.16 10:41:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.16 10:41:39 - Connection terminated. . 2021.05.16 10:41:39 - IPv6 restored with packet filtering. . 2021.05.16 10:41:39 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 10:41:39 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.16 10:41:39 - DNS leak protection with packet filtering disabled. . 2021.05.16 10:41:39 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 10:41:39 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.16 10:41:39 - Flushing DNS ! 2021.05.16 10:41:39 - Session terminated. I 2021.05.16 10:41:44 - Session starting. I 2021.05.16 10:41:45 - Checking authorization ... . 2021.05.16 10:41:45 - IPv6 disabled with packet filtering. ! 2021.05.16 10:41:45 - Connecting to Situla (Netherlands, Alblasserdam) . 2021.05.16 10:41:45 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 10:41:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 10:41:45 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 10:41:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:41:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:41:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:41:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:41:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.17:443 . 2021.05.16 10:41:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 10:41:45 - OpenVPN > UDP link local: (not bound) . 2021.05.16 10:41:45 - OpenVPN > UDP link remote: [AF_INET]213.152.161.17:443 . 2021.05.16 10:41:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.17:443, sid=42bc242c 46cae0e9 . 2021.05.16 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 10:41:45 - OpenVPN > VERIFY KU OK . 2021.05.16 10:41:45 - OpenVPN > Validating certificate extended key usage . 2021.05.16 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 10:41:45 - OpenVPN > VERIFY EKU OK . 2021.05.16 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Situla, emailAddress=info@airvpn.org . 2021.05.16 10:41:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:41:45 - OpenVPN > [Situla] Peer Connection Initiated with [AF_INET]213.152.161.17:443 . 2021.05.16 10:41:46 - OpenVPN > SENT CONTROL [Situla]: 'PUSH_REQUEST' (status=1) . 2021.05.16 10:41:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.106.1,dhcp-option DNS6 fde6:7a:7d20:1a6a::1,tun-ipv6,route-gateway 10.30.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a6a::100f/64 fde6:7a:7d20:1a6a::1,ifconfig 10.30.106.17 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.16 10:41:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 10:41:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a6a::1' . 2021.05.16 10:41:46 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.16 10:41:46 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1a6a::100f/64 fde6:7a:7d20:1a6a::1' . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 10:41:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 10:41:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 10:41:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:41:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:41:46 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 10:41:46 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.16 10:41:46 - OpenVPN > open_tun . 2021.05.16 10:41:46 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 10:41:46 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 10:41:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.106.0/10.30.106.17/255.255.255.0 [SUCCEEDED] . 2021.05.16 10:41:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.106.17/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.30.106.254, lease-time: 31536000] . 2021.05.16 10:41:46 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.16 10:41:46 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.16 10:41:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 10:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.17 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.106.1 . 2021.05.16 10:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:41:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.106.1 . 2021.05.16 10:41:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:41:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:41:51 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 10:41:51 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 10:41:51 - DNS leak protection with packet filtering enabled. . 2021.05.16 10:41:51 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.30.106.1) . 2021.05.16 10:41:51 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.30.106.1) . 2021.05.16 10:41:51 - Routes, added a new route, 213.152.161.15 for gateway 10.30.106.1 . 2021.05.16 10:41:51 - Unable to compute route for 2a00:1678:2470:39:ddf1:680c:a9e0:377a: IPv6 VPN gateway not available. . 2021.05.16 10:41:51 - Flushing DNS I 2021.05.16 10:41:51 - Checking route IPv4 I 2021.05.16 10:41:51 - Checking DNS ! 2021.05.16 10:41:52 - Connected. . 2021.05.16 10:41:52 - OpenVPN > Initialization Sequence Completed ! 2021.05.16 10:43:58 - Disconnecting . 2021.05.16 10:43:58 - Routes, removed a route previously added, 213.152.161.15 for gateway 10.30.106.1 . 2021.05.16 10:43:58 - Sending soft termination signal . 2021.05.16 10:44:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.16 10:44:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.17 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:44:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.30.106.1 . 2021.05.16 10:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:44:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.30.106.1 . 2021.05.16 10:44:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:44:03 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 10:44:03 - OpenVPN > TAP: DHCP address released . 2021.05.16 10:44:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.16 10:44:03 - Connection terminated. . 2021.05.16 10:44:03 - IPv6 restored with packet filtering. . 2021.05.16 10:44:03 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 10:44:03 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.16 10:44:03 - DNS leak protection with packet filtering disabled. . 2021.05.16 10:44:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 10:44:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.16 10:44:03 - Flushing DNS ! 2021.05.16 10:44:03 - Session terminated. I 2021.05.16 10:44:08 - Session starting. I 2021.05.16 10:44:09 - Checking authorization ... . 2021.05.16 10:44:09 - IPv6 disabled with packet filtering. ! 2021.05.16 10:44:09 - Connecting to Tianyi (Netherlands, Alblasserdam) . 2021.05.16 10:44:09 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 10:44:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 10:44:09 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 10:44:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:44:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:44:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:44:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:44:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.175:443 . 2021.05.16 10:44:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 10:44:09 - OpenVPN > UDP link local: (not bound) . 2021.05.16 10:44:09 - OpenVPN > UDP link remote: [AF_INET]213.152.186.175:443 . 2021.05.16 10:44:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.175:443, sid=f7787687 993c05f3 . 2021.05.16 10:44:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 10:44:09 - OpenVPN > VERIFY KU OK . 2021.05.16 10:44:09 - OpenVPN > Validating certificate extended key usage . 2021.05.16 10:44:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 10:44:09 - OpenVPN > VERIFY EKU OK . 2021.05.16 10:44:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tianyi, emailAddress=info@airvpn.org . 2021.05.16 10:44:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:44:09 - OpenVPN > [Tianyi] Peer Connection Initiated with [AF_INET]213.152.186.175:443 . 2021.05.16 10:44:10 - OpenVPN > SENT CONTROL [Tianyi]: 'PUSH_REQUEST' (status=1) . 2021.05.16 10:44:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.10.1,dhcp-option DNS6 fde6:7a:7d20:30a::1,tun-ipv6,route-gateway 10.7.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:30a::101b/64 fde6:7a:7d20:30a::1,ifconfig 10.7.10.29 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2021.05.16 10:44:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 10:44:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:30a::1' . 2021.05.16 10:44:10 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.16 10:44:10 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:30a::101b/64 fde6:7a:7d20:30a::1' . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 10:44:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 10:44:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 10:44:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:44:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:44:10 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 10:44:10 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.16 10:44:10 - OpenVPN > open_tun . 2021.05.16 10:44:10 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 10:44:10 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 10:44:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.10.0/10.7.10.29/255.255.255.0 [SUCCEEDED] . 2021.05.16 10:44:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.10.29/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.7.10.254, lease-time: 31536000] . 2021.05.16 10:44:10 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.16 10:44:10 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.16 10:44:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 10:44:15 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.186.175 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:44:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:44:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:44:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.10.1 . 2021.05.16 10:44:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:44:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:44:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.10.1 . 2021.05.16 10:44:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:44:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:44:15 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 10:44:15 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 10:44:15 - DNS leak protection with packet filtering enabled. . 2021.05.16 10:44:15 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.7.10.1) . 2021.05.16 10:44:15 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.7.10.1) . 2021.05.16 10:44:15 - Routes, restored a previously deleted route, 213.152.186.173 for gateway 10.7.10.1 . 2021.05.16 10:44:15 - Unable to compute route for 2a00:1678:1337:2430:5879:14eb:6d99:c756: IPv6 VPN gateway not available. . 2021.05.16 10:44:15 - Flushing DNS I 2021.05.16 10:44:15 - Checking route IPv4 I 2021.05.16 10:44:16 - Checking DNS ! 2021.05.16 10:44:16 - Connected. . 2021.05.16 10:44:16 - OpenVPN > Initialization Sequence Completed ! 2021.05.16 10:55:02 - Disconnecting . 2021.05.16 10:55:02 - Routes, removed an existing route, 213.152.186.173 for gateway 10.7.10.1 . 2021.05.16 10:55:02 - Sending soft termination signal . 2021.05.16 10:55:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.05.16 10:55:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.186.175 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:55:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:55:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.10.1 . 2021.05.16 10:55:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:55:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.10.1 . 2021.05.16 10:55:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.05.16 10:55:07 - OpenVPN > Closing TUN/TAP interface . 2021.05.16 10:55:07 - OpenVPN > TAP: DHCP address released . 2021.05.16 10:55:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.05.16 10:55:07 - Connection terminated. . 2021.05.16 10:55:07 - IPv6 restored with packet filtering. . 2021.05.16 10:55:07 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.05.16 10:55:07 - DNS IPv4 of a network adapter restored to original settings (Ethernet0 2, to automatic) . 2021.05.16 10:55:07 - DNS leak protection with packet filtering disabled. . 2021.05.16 10:55:07 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.05.16 10:55:07 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.05.16 10:55:07 - Flushing DNS ! 2021.05.16 10:55:07 - Session terminated. I 2021.05.16 10:55:11 - Session starting. I 2021.05.16 10:55:11 - Checking authorization ... . 2021.05.16 10:55:12 - IPv6 disabled with packet filtering. ! 2021.05.16 10:55:12 - Connecting to Capricornus (Belgium, Brussels) . 2021.05.16 10:55:12 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.05.16 10:55:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.05.16 10:55:12 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.05.16 10:55:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:55:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:55:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.05.16 10:55:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.05.16 10:55:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.93:443 . 2021.05.16 10:55:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.05.16 10:55:12 - OpenVPN > UDP link local: (not bound) . 2021.05.16 10:55:12 - OpenVPN > UDP link remote: [AF_INET]194.187.251.93:443 . 2021.05.16 10:55:12 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.93:443, sid=3227abf7 b33bfdc1 . 2021.05.16 10:55:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.05.16 10:55:12 - OpenVPN > VERIFY KU OK . 2021.05.16 10:55:12 - OpenVPN > Validating certificate extended key usage . 2021.05.16 10:55:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.05.16 10:55:12 - OpenVPN > VERIFY EKU OK . 2021.05.16 10:55:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org . 2021.05.16 10:55:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.05.16 10:55:12 - OpenVPN > [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.93:443 . 2021.05.16 10:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.170.1,dhcp-option DNS6 fde6:7a:7d20:8aa::1,tun-ipv6,route-gateway 10.12.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8aa::10f9/64 fde6:7a:7d20:8aa::1,ifconfig 10.12.170.251 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2021.05.16 10:55:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.05.16 10:55:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:8aa::1' . 2021.05.16 10:55:12 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.05.16 10:55:12 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:8aa::10f9/64 fde6:7a:7d20:8aa::1' . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.05.16 10:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.05.16 10:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.05.16 10:55:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:55:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.05.16 10:55:12 - OpenVPN > interactive service msg_channel=0 . 2021.05.16 10:55:12 - OpenVPN > ROUTE_GATEWAY 172.16.186.1/255.255.255.0 I=18 HWADDR=00:0c:29:e4:06:e6 . 2021.05.16 10:55:12 - OpenVPN > open_tun . 2021.05.16 10:55:12 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.05.16 10:55:12 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.05.16 10:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.12.170.0/10.12.170.251/255.255.255.0 [SUCCEEDED] . 2021.05.16 10:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.12.170.251/255.255.255.0 on interface {229BE307-F851-4E37-ACFA-B752842DBF70} [DHCP-serv: 10.12.170.254, lease-time: 31536000] . 2021.05.16 10:55:12 - OpenVPN > Successful ARP Flush on interface [3] {229BE307-F851-4E37-ACFA-B752842DBF70} . 2021.05.16 10:55:12 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.05.16 10:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.05.16 10:55:17 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.93 MASK 255.255.255.255 172.16.186.1 . 2021.05.16 10:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:55:17 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.12.170.1 . 2021.05.16 10:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:55:17 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.12.170.1 . 2021.05.16 10:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.05.16 10:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.05.16 10:55:17 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.05.16 10:55:17 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.05.16 10:55:17 - DNS leak protection with packet filtering enabled. . 2021.05.16 10:55:18 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.12.170.1) . 2021.05.16 10:55:18 - DNS IPv4 of a network adapter forced (Ethernet0 2, from automatic to 10.12.170.1) . 2021.05.16 10:55:18 - Routes, added a new route, 194.187.251.91 for gateway 10.12.170.1 . 2021.05.16 10:55:18 - Unable to compute route for 2001:ac8:27:a:d655:22aa:7624:7223: IPv6 VPN gateway not available. . 2021.05.16 10:55:18 - Flushing DNS I 2021.05.16 10:55:18 - Checking route IPv4 I 2021.05.16 10:55:19 - Checking DNS ! 2021.05.16 10:55:19 - Connected. . 2021.05.16 10:55:19 - OpenVPN > Initialization Sequence Completed . 2021.05.16 10:56:07 - Collect information about AirVPN completed . 2021.05.16 11:20:10 - ping 1 . 2021.05.16 11:20:10 - ping 2 W . 2021.05.16 11:20:10 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "172.16.186.1", "metric": "25" }, { "address": "0.0.0.0\/1", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "10.12.170.1", "metric": "3" }, { "address": "10.12.170.0\/24", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "10.12.170.251", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "10.12.170.255", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "10.12.170.1", "metric": "3" }, { "address": "134.19.179.171", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "10.29.138.1", "metric": "4" }, { "address": "172.16.186.0\/24", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "172.16.186.2", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "172.16.186.255", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "194.187.251.91", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "10.12.170.1", "metric": "4" }, { "address": "194.187.251.93", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "172.16.186.1", "metric": "25" }, { "address": "213.152.161.149", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "10.32.234.1", "metric": "4" }, { "address": "224.0.0.0\/4", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "::1", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2a00:1678:2470:32:a6d0:3939:bb6b:a0e4", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "fde6:7a:7d20:dca::1", "metric": "259" }, { "address": "fe80::\/64", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "fe80::8116:69ed:ed21:8322", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "fe80::a0a0:e0de:1bb5:c906", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "ff00::\/8", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "gateway": "link", "metric": "281" }, { "address": "2a00:1678:2470:32:a6d0:3939:bb6b:a0e4", "gateway": "fde6:7a:7d20:dca::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "3749299018", "bytes_sent": "805306841", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8116:69ed:ed21:8322", "10.12.170.251" ], "gateways": [ "10.12.170.1", "10.29.138.1", "10.32.234.1", "fde6:7a:7d20:dca::1" ], "bind": true, "dns4": "10.12.170.1", "dns6": null }, { "friendly": "Ethernet0 2", "id": "{ECFE760A-1687-4B9C-89EF-6F105772AF50}", "name": "Ethernet0 2", "description": "Intel(R) 82574L Gigabit Network Connection #2", "type": "Ethernet", "status": "Up", "bytes_received": "4415008540", "bytes_sent": "1091112365", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a0a0:e0de:1bb5:c906", "172.16.186.2" ], "gateways": [ "172.16.186.1" ], "bind": true, "dns4": "10.12.170.1", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "isatap.{229BE307-F851-4E37-ACFA-B752842DBF70}", "id": "{DF3DDC15-FB19-4E1F-82D0-36D6E058CA7C}", "name": "isatap.{229BE307-F851-4E37-ACFA-B752842DBF70}", "description": "Microsoft ISATAP Adapter", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:10.12.170.251" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "isatap.lan", "id": "{498927C5-5C62-468D-9E2B-8D62F39FA25E}", "name": "isatap.lan", "description": "Microsoft ISATAP Adapter #3", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:172.16.186.2" ], "gateways": [], "bind": true, "dns4": null, "dns6": null } ], "ipv4-default-gateway": "10.12.170.1", "ipv4-default-interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}", "ipv6-default-gateway": "fde6:7a:7d20:dca::1", "ipv6-default-interface": "{229BE307-F851-4E37-ACFA-B752842DBF70}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : PLMServer Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : lan Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-22-9B-E3-07 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::8116:69ed:ed21:8322%3(Preferred) IPv4 Address. . . . . . . . . . . : 10.12.170.251(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, May 16, 2021 10:55:12 AM Lease Expires . . . . . . . . . . : Monday, May 16, 2022 10:55:11 AM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.12.170.254 DHCPv6 IAID . . . . . . . . . . . : 201391906 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-DE-19-05-00-0C-29-44-B7-48 DNS Servers . . . . . . . . . . . : 10.12.170.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet0 2: Connection-specific DNS Suffix . : lan Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection #2 Physical Address. . . . . . . . . : 00-0C-29-E4-06-E6 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::a0a0:e0de:1bb5:c906%18(Preferred) IPv4 Address. . . . . . . . . . . : 172.16.186.2(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Saturday, May 15, 2021 5:06:55 PM Lease Expires . . . . . . . . . . : Monday, May 17, 2021 10:18:12 AM Default Gateway . . . . . . . . . : 172.16.186.1 DHCP Server . . . . . . . . . . . : 172.16.186.1 DHCPv6 IAID . . . . . . . . . . . : 117443625 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-DE-19-05-00-0C-29-44-B7-48 DNS Servers . . . . . . . . . . . : 10.12.170.1 NetBIOS over Tcpip. . . . . . . . : Enabled Tunnel adapter isatap.{229BE307-F851-4E37-ACFA-B752842DBF70}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.lan: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : lan Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes
  1. Load more activity
×
×
  • Create New...