Jump to content
Not connected, Your IP: 3.233.215.231
selavi

cant connect to airvpn or cant open any pages

Recommended Posts

Posted ... (edited)

hi everyone,
i  was using a lenovo yoga 3 pro with win 8.1. my ssd died and i had it replaced. they upgraded to win 10 (with my permission). now either i cant connect to any server or if i do, i cant open any web page.

i am pasting my log file (please help me with this):
 

. 2020.01.04 17:10:56 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home Single Language, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.01.04 17:10:56 - Reading options from C:\Program Files\AirVPN\default.xml
. 2020.01.04 17:10:56 - Command line arguments (0):
. 2020.01.04 17:10:56 - Profile path: C:\Program Files\AirVPN\default.xml
. 2020.01.04 17:10:59 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2020.01.04 17:10:59 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.01.04 17:10:59 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.01.04 17:10:59 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.01.04 17:10:59 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2020.01.04 17:10:59 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2020.01.04 17:11:00 - Updating systems & servers data ...
I 2020.01.04 17:11:00 - Ready
. 2020.01.04 17:11:01 - Systems & servers data update completed
I 2020.01.04 17:11:18 - Checking login ...
! 2020.01.04 17:11:18 - Logged in.
I 2020.01.04 17:20:05 - Session starting.
I 2020.01.04 17:20:05 - Checking authorization ...
! 2020.01.04 17:20:06 - Connecting to Menkalinan (Germany, Frankfurt)
. 2020.01.04 17:20:06 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:20:06 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:20:06 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:20:06 - Connection to OpenVPN Management Interface
. 2020.01.04 17:20:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:20:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:20:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:20:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:20:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:20:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:20:06 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:20:06 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:06 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=6f40dd05 b91d3def
. 2020.01.04 17:20:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:20:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:20:07 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:20:07 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:20:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:20:07 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:20:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org
. 2020.01.04 17:20:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:20:14 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:15 - OpenVPN > SENT CONTROL [Menkalinan]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:20:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.22.1,dhcp-option DNS6 fde6:7a:7d20:1716::1,tun-ipv6,route-gateway 10.27.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1716::1064/64 fde6:7a:7d20:1716::1,ifconfig 10.27.22.102 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2020.01.04 17:20:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:20:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:20:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:20:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:20:16 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:20:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:20:16 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:20:16 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:20:16 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:20:16 - OpenVPN > open_tun
. 2020.01.04 17:20:16 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:20:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:20:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.22.0/10.27.22.102/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:20:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.22.102/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.27.22.254, lease-time: 31536000]
. 2020.01.04 17:20:16 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:20:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:20:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:20:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1716::1 validate=no
. 2020.01.04 17:20:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1716::/64 -> fde6:7a:7d20:1716::1064 metric 0) dev Ethernet
. 2020.01.04 17:20:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:20:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:20:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:20:23 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:20:23 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.22.1)
. 2020.01.04 17:20:23 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1716::1)
. 2020.01.04 17:20:24 - Routes, added a new route, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:20:24 - Routes, added a new route, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:20:24 - Flushing DNS
I 2020.01.04 17:20:27 - Checking route IPv4
. 2020.01.04 17:20:47 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:20:47 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:20:47 - Disconnecting
. 2020.01.04 17:20:47 - Routes, removed a route previously added, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:20:47 - Routes, removed a route previously added, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:20:47 - Sending management termination signal
. 2020.01.04 17:20:47 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:20:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:20:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1716::/64)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:20:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:20:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:20:53 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:20:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:20:53 - Connection terminated.
. 2020.01.04 17:20:53 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:20:53 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:20:53 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:20:53 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:20:53 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:20:53 - Cancel requested.
! 2020.01.04 17:20:53 - Session terminated.
. 2020.01.04 17:21:04 - Updating systems & servers data ...
. 2020.01.04 17:21:05 - Systems & servers data update completed
! 2020.01.04 17:21:25 - Activation of Network Lock - Windows Filtering Platform
I 2020.01.04 17:21:33 - Session starting.
I 2020.01.04 17:21:33 - Checking authorization ...
! 2020.01.04 17:21:33 - Connecting to Menkalinan (Germany, Frankfurt)
. 2020.01.04 17:21:33 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:21:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:21:33 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:21:33 - Connection to OpenVPN Management Interface
. 2020.01.04 17:21:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:21:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:21:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:21:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:21:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:21:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:21:33 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:21:33 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:21:34 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=bf1de6e5 8eca4c08
. 2020.01.04 17:21:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:21:35 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:21:35 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:21:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:21:35 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:21:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org
. 2020.01.04 17:21:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:21:41 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:42 - OpenVPN > SENT CONTROL [Menkalinan]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:21:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.22.1,dhcp-option DNS6 fde6:7a:7d20:1716::1,tun-ipv6,route-gateway 10.27.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1716::1064/64 fde6:7a:7d20:1716::1,ifconfig 10.27.22.102 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2020.01.04 17:21:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:21:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:21:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:21:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:21:43 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:21:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:21:43 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:21:43 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:21:43 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:21:43 - OpenVPN > open_tun
. 2020.01.04 17:21:43 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:21:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:21:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.22.0/10.27.22.102/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:21:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.22.102/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.27.22.254, lease-time: 31536000]
. 2020.01.04 17:21:43 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:21:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:21:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:21:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1716::1 validate=no
. 2020.01.04 17:21:45 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.04 17:21:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1716::/64 -> fde6:7a:7d20:1716::1064 metric 0) dev Ethernet
. 2020.01.04 17:21:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:21:45 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:51 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:21:51 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:21:51 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:21:51 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.22.1)
. 2020.01.04 17:21:51 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1716::1)
. 2020.01.04 17:21:51 - Routes, added a new route, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:21:51 - Routes, added a new route, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:21:51 - Flushing DNS
I 2020.01.04 17:21:54 - Checking route IPv4
. 2020.01.04 17:22:14 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:22:14 - Checking route (2° try)
. 2020.01.04 17:22:36 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:22:36 - Checking route (3° try)
. 2020.01.04 17:22:58 - curl: (28) Operation timed out after 20016 milliseconds with 0 out of 0 bytes received
E 2020.01.04 17:22:58 - Checking route IPv4 failed.
. 2020.01.04 17:22:58 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:22:58 - Disconnecting
. 2020.01.04 17:22:58 - Routes, removed a route previously added, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:22:58 - Routes, removed a route previously added, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:22:58 - Sending management termination signal
. 2020.01.04 17:22:58 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:22:58 - OpenVPN > MANAGEMENT: CMD 'cdb7522b2a237e83782727a09c4d7a37271a54b594cd3c130ba37021d29d40d7'
. 2020.01.04 17:23:08 - Sending management termination signal
. 2020.01.04 17:23:08 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:23:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:23:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1716::/64)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:23:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:23:14 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:23:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:23:14 - Connection terminated.
. 2020.01.04 17:23:14 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:23:14 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:23:14 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:23:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:23:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:23:17 - Checking authorization ...
! 2020.01.04 17:23:18 - Connecting to Muscida (Netherlands, Alblasserdam)
. 2020.01.04 17:23:18 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:23:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:23:18 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:23:18 - Connection to OpenVPN Management Interface
. 2020.01.04 17:23:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:23:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:23:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:23:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:23:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:23:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443
. 2020.01.04 17:23:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:23:18 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:23:18 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443
. 2020.01.04 17:23:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:23:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=460f55ba 29afe2bc
. 2020.01.04 17:23:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:23:19 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:23:19 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:23:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:23:19 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:23:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2020.01.04 17:23:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:23:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.156:443
! 2020.01.04 17:23:27 - Disconnecting
. 2020.01.04 17:23:27 - Sending management termination signal
. 2020.01.04 17:23:27 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:23:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:23:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.150.1,dhcp-option DNS6 fde6:7a:7d20:1496::1,tun-ipv6,route-gateway 10.24.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1496::1028/64 fde6:7a:7d20:1496::1,ifconfig 10.24.150.42 255.255.255.0,peer-id 10,cipher AES-256-GCM'
. 2020.01.04 17:23:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:23:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:23:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:23:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:23:29 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:23:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:23:29 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:23:29 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:23:29 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:23:29 - OpenVPN > open_tun
. 2020.01.04 17:23:29 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:23:29 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:23:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.150.0/10.24.150.42/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:23:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.150.42/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.24.150.254, lease-time: 31536000]
. 2020.01.04 17:23:29 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:23:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:23:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:23:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1496::1 validate=no
. 2020.01.04 17:23:31 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.04 17:23:31 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1496::/64 -> fde6:7a:7d20:1496::1028 metric 0) dev Ethernet
. 2020.01.04 17:23:31 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:31 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:32 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:23:32 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1496::/64)
. 2020.01.04 17:23:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:23:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:23:32 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:23:32 - Connection terminated.
I 2020.01.04 17:23:32 - Cancel requested.
! 2020.01.04 17:23:32 - Session terminated.
! 2020.01.04 17:24:14 - Deactivation of Network Lock
I 2020.01.04 17:29:13 - Session starting.
I 2020.01.04 17:29:14 - Checking authorization ...
! 2020.01.04 17:29:14 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2020.01.04 17:29:14 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:29:14 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:29:14 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:29:14 - Connection to OpenVPN Management Interface
. 2020.01.04 17:29:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:29:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:29:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:29:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:29:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:29:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:29:14 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:29:14 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:29:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=a1756fea fe91b122
. 2020.01.04 17:29:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:29:16 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:29:16 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:29:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:29:16 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:29:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org
. 2020.01.04 17:29:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:29:22 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:23 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:29:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.246.1,dhcp-option DNS6 fde6:7a:7d20:ff6::1,tun-ipv6,route-gateway 10.19.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ff6::10d3/64 fde6:7a:7d20:ff6::1,ifconfig 10.19.246.213 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2020.01.04 17:29:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:29:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:29:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:29:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:29:24 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:29:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:29:24 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:29:24 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:29:24 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:29:24 - OpenVPN > open_tun
. 2020.01.04 17:29:24 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:29:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:29:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.246.0/10.19.246.213/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:29:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.246.213/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.19.246.254, lease-time: 31536000]
. 2020.01.04 17:29:24 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:29:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:29:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:ff6::10d3 store=active
. 2020.01.04 17:29:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:ff6::1 validate=no
. 2020.01.04 17:29:27 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ff6::/64 -> fde6:7a:7d20:ff6::10d3 metric 0) dev Ethernet
. 2020.01.04 17:29:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ff6::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:29:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.87 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:29:32 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:29:32 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:29:33 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.19.246.1)
. 2020.01.04 17:29:33 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:ff6::1)
. 2020.01.04 17:29:33 - Routes, added a new route, 213.152.161.85 for gateway 10.19.246.1
. 2020.01.04 17:29:33 - Routes, added a new route, 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e for gateway fde6:7a:7d20:ff6::1
. 2020.01.04 17:29:33 - Flushing DNS
I 2020.01.04 17:29:36 - Checking route IPv4
. 2020.01.04 17:29:56 - curl: (28) Operation timed out after 20000 milliseconds with 0 bytes received
. 2020.01.04 17:29:56 - Checking route (2° try)
. 2020.01.04 17:30:17 - curl: (28) Operation timed out after 20015 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:30:17 - Checking route (3° try)
. 2020.01.04 17:30:39 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
E 2020.01.04 17:30:39 - Checking route IPv4 failed.
. 2020.01.04 17:30:39 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:30:39 - Disconnecting
. 2020.01.04 17:30:40 - Routes, removed a route previously added, 213.152.161.85 for gateway 10.19.246.1
. 2020.01.04 17:30:40 - Routes, removed a route previously added, 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e for gateway fde6:7a:7d20:ff6::1
. 2020.01.04 17:30:40 - Sending management termination signal
. 2020.01.04 17:30:40 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:30:40 - OpenVPN > MANAGEMENT: CMD '2ced5af69e15c8c3ad1746f2ae71af2963a5ade0939414373dbc585e98947b39'
. 2020.01.04 17:30:49 - Sending management termination signal
. 2020.01.04 17:30:49 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:30:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:30:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.87 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:30:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:54 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:30:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ff6::/64)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ff6::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:ff6::10d3 store=active
. 2020.01.04 17:30:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:30:55 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:30:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:30:55 - Connection terminated.
. 2020.01.04 17:30:56 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:30:56 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:30:56 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:30:56 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:30:56 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:30:59 - Checking authorization ...
! 2020.01.04 17:30:59 - Connecting to Muscida (Netherlands, Alblasserdam)
. 2020.01.04 17:30:59 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:30:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:30:59 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:30:59 - Connection to OpenVPN Management Interface
. 2020.01.04 17:30:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:30:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:30:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:30:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:30:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:30:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443
. 2020.01.04 17:30:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:30:59 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:30:59 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443
. 2020.01.04 17:31:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:31:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=fbd7ff60 fb312fad
. 2020.01.04 17:31:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:31:01 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:31:01 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:31:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:31:01 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:31:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2020.01.04 17:31:07 - Updating systems & servers data ...
. 2020.01.04 17:31:08 - Systems & servers data update completed
. 2020.01.04 17:31:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:31:14 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.156:443
. 2020.01.04 17:31:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:31:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.150.1,dhcp-option DNS6 fde6:7a:7d20:1496::1,tun-ipv6,route-gateway 10.24.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1496::1028/64 fde6:7a:7d20:1496::1,ifconfig 10.24.150.42 255.255.255.0,peer-id 11,cipher AES-256-GCM'
. 2020.01.04 17:31:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:31:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:31:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:31:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:31:16 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:31:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:31:16 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:31:16 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:31:16 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:31:16 - OpenVPN > open_tun
. 2020.01.04 17:31:16 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:31:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:31:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.150.0/10.24.150.42/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:31:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.150.42/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.24.150.254, lease-time: 31536000]
. 2020.01.04 17:31:16 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:31:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:31:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:31:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1496::1 validate=no
. 2020.01.04 17:31:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1496::/64 -> fde6:7a:7d20:1496::1028 metric 0) dev Ethernet
. 2020.01.04 17:31:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:31:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.156 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:31:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:31:23 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:31:24 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.24.150.1)
. 2020.01.04 17:31:24 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1496::1)
. 2020.01.04 17:31:24 - Routes, added a new route, 213.152.162.154 for gateway 10.24.150.1
. 2020.01.04 17:31:24 - Routes, added a new route, 2a00:1678:2470:5:3568:e603:2b4d:aeb6 for gateway fde6:7a:7d20:1496::1
. 2020.01.04 17:31:24 - Flushing DNS
I 2020.01.04 17:31:28 - Checking route IPv4
. 2020.01.04 17:31:48 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:31:48 - Checking route (2° try)
I 2020.01.04 17:32:04 - Checking route IPv6
. 2020.01.04 17:32:25 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:32:25 - Checking route (2° try)
. 2020.01.04 17:32:46 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:32:46 - Checking route (3° try)
I 2020.01.04 17:32:56 - Checking DNS
. 2020.01.04 17:33:17 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:33:17 - Checking DNS (2° try)
! 2020.01.04 17:33:27 - Connected.
. 2020.01.04 17:33:27 - OpenVPN > Initialization Sequence Completed

Edited ... by giganerd
LOG formatting

Share this post


Link to post

Hmm, interesting, you have a similar situation as another user. Wouldn't go as far as calling it the same but let's see.
Can you please upload a support file here? It's the lifebelt icon in the Logs tab.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
Posted ... (edited)

sure, anything to solve this problem:

Eddie System/Environment Report - 5.01.2020 03:15 UTC

Eddie version: 2.16.3
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home Single Language
OS version: Microsoft Windows NT 10.0.18363.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Program Files\AirVPN\default.xml
Data path: C:\Program Files\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (0 args) 
Network Lock Active: No
Connected to VPN: No
Detected DNS: 192.168.1.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 30 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.website
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True

----------------------------
Logs:

. 2020.01.04 17:10:56 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home Single Language, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.01.04 17:10:56 - Reading options from C:\Program Files\AirVPN\default.xml
. 2020.01.04 17:10:56 - Command line arguments (0):
. 2020.01.04 17:10:56 - Profile path: C:\Program Files\AirVPN\default.xml
. 2020.01.04 17:10:59 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2020.01.04 17:10:59 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.01.04 17:10:59 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.01.04 17:10:59 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.01.04 17:10:59 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2020.01.04 17:10:59 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2020.01.04 17:11:00 - Updating systems & servers data ...
I 2020.01.04 17:11:00 - Ready
. 2020.01.04 17:11:01 - Systems & servers data update completed
I 2020.01.04 17:11:18 - Checking login ...
! 2020.01.04 17:11:18 - Logged in.
I 2020.01.04 17:20:05 - Session starting.
I 2020.01.04 17:20:05 - Checking authorization ...
! 2020.01.04 17:20:06 - Connecting to Menkalinan (Germany, Frankfurt)
. 2020.01.04 17:20:06 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:20:06 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:20:06 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:20:06 - Connection to OpenVPN Management Interface
. 2020.01.04 17:20:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:20:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:20:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:20:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:20:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:20:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:20:06 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:20:06 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:06 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=6f40dd05 b91d3def
. 2020.01.04 17:20:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:20:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:20:07 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:20:07 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:20:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:20:07 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:20:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org
. 2020.01.04 17:20:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:20:14 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443
. 2020.01.04 17:20:15 - OpenVPN > SENT CONTROL [Menkalinan]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:20:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.22.1,dhcp-option DNS6 fde6:7a:7d20:1716::1,tun-ipv6,route-gateway 10.27.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1716::1064/64 fde6:7a:7d20:1716::1,ifconfig 10.27.22.102 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2020.01.04 17:20:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:20:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:20:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:20:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:20:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:20:16 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:20:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:20:16 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:20:16 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:20:16 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:20:16 - OpenVPN > open_tun
. 2020.01.04 17:20:16 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:20:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:20:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.22.0/10.27.22.102/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:20:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.22.102/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.27.22.254, lease-time: 31536000]
. 2020.01.04 17:20:16 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:20:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:20:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:20:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1716::1 validate=no
. 2020.01.04 17:20:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1716::/64 -> fde6:7a:7d20:1716::1064 metric 0) dev Ethernet
. 2020.01.04 17:20:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:20:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:20:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:20:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:20:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:20:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:20:23 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:20:23 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.22.1)
. 2020.01.04 17:20:23 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1716::1)
. 2020.01.04 17:20:24 - Routes, added a new route, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:20:24 - Routes, added a new route, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:20:24 - Flushing DNS
I 2020.01.04 17:20:27 - Checking route IPv4
. 2020.01.04 17:20:47 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:20:47 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:20:47 - Disconnecting
. 2020.01.04 17:20:47 - Routes, removed a route previously added, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:20:47 - Routes, removed a route previously added, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:20:47 - Sending management termination signal
. 2020.01.04 17:20:47 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:20:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:20:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:20:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:20:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:20:52 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:20:52 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1716::/64)
. 2020.01.04 17:20:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:20:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:20:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:20:53 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:20:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:20:53 - Connection terminated.
. 2020.01.04 17:20:53 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:20:53 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:20:53 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:20:53 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:20:53 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:20:53 - Cancel requested.
! 2020.01.04 17:20:53 - Session terminated.
. 2020.01.04 17:21:04 - Updating systems & servers data ...
. 2020.01.04 17:21:05 - Systems & servers data update completed
! 2020.01.04 17:21:25 - Activation of Network Lock - Windows Filtering Platform
I 2020.01.04 17:21:33 - Session starting.
I 2020.01.04 17:21:33 - Checking authorization ...
! 2020.01.04 17:21:33 - Connecting to Menkalinan (Germany, Frankfurt)
. 2020.01.04 17:21:33 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:21:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:21:33 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:21:33 - Connection to OpenVPN Management Interface
. 2020.01.04 17:21:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:21:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:21:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:21:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:21:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:21:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:21:33 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:21:33 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:21:34 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=bf1de6e5 8eca4c08
. 2020.01.04 17:21:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:21:35 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:21:35 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:21:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:21:35 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:21:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org
. 2020.01.04 17:21:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:21:41 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443
. 2020.01.04 17:21:42 - OpenVPN > SENT CONTROL [Menkalinan]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:21:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.22.1,dhcp-option DNS6 fde6:7a:7d20:1716::1,tun-ipv6,route-gateway 10.27.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1716::1064/64 fde6:7a:7d20:1716::1,ifconfig 10.27.22.102 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2020.01.04 17:21:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:21:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:21:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:21:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:21:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:21:43 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:21:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:21:43 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:21:43 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:21:43 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:21:43 - OpenVPN > open_tun
. 2020.01.04 17:21:43 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:21:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:21:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.22.0/10.27.22.102/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:21:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.22.102/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.27.22.254, lease-time: 31536000]
. 2020.01.04 17:21:43 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:21:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:21:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:21:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1716::1 validate=no
. 2020.01.04 17:21:45 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.04 17:21:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1716::/64 -> fde6:7a:7d20:1716::1064 metric 0) dev Ethernet
. 2020.01.04 17:21:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:21:45 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:21:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:21:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:50 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.04 17:21:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:21:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:21:51 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:21:51 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:21:51 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:21:51 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.22.1)
. 2020.01.04 17:21:51 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1716::1)
. 2020.01.04 17:21:51 - Routes, added a new route, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:21:51 - Routes, added a new route, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:21:51 - Flushing DNS
I 2020.01.04 17:21:54 - Checking route IPv4
. 2020.01.04 17:22:14 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:22:14 - Checking route (2° try)
. 2020.01.04 17:22:36 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:22:36 - Checking route (3° try)
. 2020.01.04 17:22:58 - curl: (28) Operation timed out after 20016 milliseconds with 0 out of 0 bytes received
E 2020.01.04 17:22:58 - Checking route IPv4 failed.
. 2020.01.04 17:22:58 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:22:58 - Disconnecting
. 2020.01.04 17:22:58 - Routes, removed a route previously added, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.04 17:22:58 - Routes, removed a route previously added, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.04 17:22:58 - Sending management termination signal
. 2020.01.04 17:22:58 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:22:58 - OpenVPN > MANAGEMENT: CMD 'cdb7522b2a237e83782727a09c4d7a37271a54b594cd3c130ba37021d29d40d7'
. 2020.01.04 17:23:08 - Sending management termination signal
. 2020.01.04 17:23:08 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:23:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:23:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.04 17:23:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:13 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:23:13 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1716::/64)
. 2020.01.04 17:23:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1716::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1716::1064 store=active
. 2020.01.04 17:23:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:23:14 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:23:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:23:14 - Connection terminated.
. 2020.01.04 17:23:14 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:23:14 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:23:14 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:23:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:23:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:23:17 - Checking authorization ...
! 2020.01.04 17:23:18 - Connecting to Muscida (Netherlands, Alblasserdam)
. 2020.01.04 17:23:18 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:23:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:23:18 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:23:18 - Connection to OpenVPN Management Interface
. 2020.01.04 17:23:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:23:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:23:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:23:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:23:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:23:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443
. 2020.01.04 17:23:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:23:18 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:23:18 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443
. 2020.01.04 17:23:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:23:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=460f55ba 29afe2bc
. 2020.01.04 17:23:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:23:19 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:23:19 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:23:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:23:19 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:23:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2020.01.04 17:23:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:23:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.156:443
! 2020.01.04 17:23:27 - Disconnecting
. 2020.01.04 17:23:27 - Sending management termination signal
. 2020.01.04 17:23:27 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:23:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:23:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.150.1,dhcp-option DNS6 fde6:7a:7d20:1496::1,tun-ipv6,route-gateway 10.24.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1496::1028/64 fde6:7a:7d20:1496::1,ifconfig 10.24.150.42 255.255.255.0,peer-id 10,cipher AES-256-GCM'
. 2020.01.04 17:23:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:23:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:23:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:23:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:23:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:23:29 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:23:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:23:29 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:23:29 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:23:29 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:23:29 - OpenVPN > open_tun
. 2020.01.04 17:23:29 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:23:29 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:23:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.150.0/10.24.150.42/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:23:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.150.42/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.24.150.254, lease-time: 31536000]
. 2020.01.04 17:23:29 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:23:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:23:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:23:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1496::1 validate=no
. 2020.01.04 17:23:31 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.04 17:23:31 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1496::/64 -> fde6:7a:7d20:1496::1028 metric 0) dev Ethernet
. 2020.01.04 17:23:31 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:31 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:23:32 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:23:32 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1496::/64)
. 2020.01.04 17:23:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:23:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:23:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:23:32 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:23:32 - Connection terminated.
I 2020.01.04 17:23:32 - Cancel requested.
! 2020.01.04 17:23:32 - Session terminated.
! 2020.01.04 17:24:14 - Deactivation of Network Lock
I 2020.01.04 17:29:13 - Session starting.
I 2020.01.04 17:29:14 - Checking authorization ...
! 2020.01.04 17:29:14 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2020.01.04 17:29:14 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:29:14 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:29:14 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:29:14 - Connection to OpenVPN Management Interface
. 2020.01.04 17:29:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:29:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:29:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:29:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:29:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:29:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:29:14 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:29:14 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:29:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=a1756fea fe91b122
. 2020.01.04 17:29:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:29:16 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:29:16 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:29:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:29:16 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:29:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org
. 2020.01.04 17:29:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:29:22 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443
. 2020.01.04 17:29:23 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:29:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.246.1,dhcp-option DNS6 fde6:7a:7d20:ff6::1,tun-ipv6,route-gateway 10.19.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ff6::10d3/64 fde6:7a:7d20:ff6::1,ifconfig 10.19.246.213 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2020.01.04 17:29:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:29:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:29:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:29:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:29:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:29:24 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:29:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:29:24 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:29:24 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:29:24 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:29:24 - OpenVPN > open_tun
. 2020.01.04 17:29:24 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:29:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:29:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.246.0/10.19.246.213/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:29:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.246.213/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.19.246.254, lease-time: 31536000]
. 2020.01.04 17:29:24 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:29:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:29:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:ff6::10d3 store=active
. 2020.01.04 17:29:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:ff6::1 validate=no
. 2020.01.04 17:29:27 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ff6::/64 -> fde6:7a:7d20:ff6::10d3 metric 0) dev Ethernet
. 2020.01.04 17:29:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ff6::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:29:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.87 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:29:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:29:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ff6::1 metric -1) dev Ethernet
. 2020.01.04 17:29:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:29:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:29:32 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:29:32 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:29:32 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:29:33 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.19.246.1)
. 2020.01.04 17:29:33 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:ff6::1)
. 2020.01.04 17:29:33 - Routes, added a new route, 213.152.161.85 for gateway 10.19.246.1
. 2020.01.04 17:29:33 - Routes, added a new route, 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e for gateway fde6:7a:7d20:ff6::1
. 2020.01.04 17:29:33 - Flushing DNS
I 2020.01.04 17:29:36 - Checking route IPv4
. 2020.01.04 17:29:56 - curl: (28) Operation timed out after 20000 milliseconds with 0 bytes received
. 2020.01.04 17:29:56 - Checking route (2° try)
. 2020.01.04 17:30:17 - curl: (28) Operation timed out after 20015 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:30:17 - Checking route (3° try)
. 2020.01.04 17:30:39 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
E 2020.01.04 17:30:39 - Checking route IPv4 failed.
. 2020.01.04 17:30:39 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:30:39 - Disconnecting
. 2020.01.04 17:30:40 - Routes, removed a route previously added, 213.152.161.85 for gateway 10.19.246.1
. 2020.01.04 17:30:40 - Routes, removed a route previously added, 2a00:1678:2470:17:ce9d:9d0a:18e5:d26e for gateway fde6:7a:7d20:ff6::1
. 2020.01.04 17:30:40 - Sending management termination signal
. 2020.01.04 17:30:40 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:30:40 - OpenVPN > MANAGEMENT: CMD '2ced5af69e15c8c3ad1746f2ae71af2963a5ade0939414373dbc585e98947b39'
. 2020.01.04 17:30:49 - Sending management termination signal
. 2020.01.04 17:30:49 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:30:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:30:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.87 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.246.1
. 2020.01.04 17:30:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:30:54 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:30:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:54 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:30:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:30:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:30:55 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:30:55 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ff6::/64)
. 2020.01.04 17:30:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ff6::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:30:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:ff6::10d3 store=active
. 2020.01.04 17:30:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:30:55 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:30:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:30:55 - Connection terminated.
. 2020.01.04 17:30:56 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:30:56 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:30:56 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:30:56 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:30:56 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.04 17:30:59 - Checking authorization ...
! 2020.01.04 17:30:59 - Connecting to Muscida (Netherlands, Alblasserdam)
. 2020.01.04 17:30:59 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.04 17:30:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.04 17:30:59 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.04 17:30:59 - Connection to OpenVPN Management Interface
. 2020.01.04 17:30:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.04 17:30:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:30:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:30:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.04 17:30:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.04 17:30:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443
. 2020.01.04 17:30:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.04 17:30:59 - OpenVPN > UDP link local: (not bound)
. 2020.01.04 17:30:59 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443
. 2020.01.04 17:31:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.04 17:31:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=fbd7ff60 fb312fad
. 2020.01.04 17:31:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.04 17:31:01 - OpenVPN > VERIFY KU OK
. 2020.01.04 17:31:01 - OpenVPN > Validating certificate extended key usage
. 2020.01.04 17:31:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.04 17:31:01 - OpenVPN > VERIFY EKU OK
. 2020.01.04 17:31:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2020.01.04 17:31:07 - Updating systems & servers data ...
. 2020.01.04 17:31:08 - Systems & servers data update completed
. 2020.01.04 17:31:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.04 17:31:14 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.156:443
. 2020.01.04 17:31:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2020.01.04 17:31:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.150.1,dhcp-option DNS6 fde6:7a:7d20:1496::1,tun-ipv6,route-gateway 10.24.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1496::1028/64 fde6:7a:7d20:1496::1,ifconfig 10.24.150.42 255.255.255.0,peer-id 11,cipher AES-256-GCM'
. 2020.01.04 17:31:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.04 17:31:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.04 17:31:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.04 17:31:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:31:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.04 17:31:16 - OpenVPN > interactive service msg_channel=0
. 2020.01.04 17:31:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=ac:d1:b8:df:7e:bf
. 2020.01.04 17:31:16 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.04 17:31:16 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.04 17:31:16 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.04 17:31:16 - OpenVPN > open_tun
. 2020.01.04 17:31:16 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}.tap
. 2020.01.04 17:31:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.04 17:31:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.150.0/10.24.150.42/255.255.255.0 [SUCCEEDED]
. 2020.01.04 17:31:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.150.42/255.255.255.0 on interface {81D4A21E-0EE2-49B7-BA15-6A88A00B3520} [DHCP-serv: 10.24.150.254, lease-time: 31536000]
. 2020.01.04 17:31:16 - OpenVPN > Successful ARP Flush on interface [10] {81D4A21E-0EE2-49B7-BA15-6A88A00B3520}
. 2020.01.04 17:31:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.04 17:31:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:31:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1496::1 validate=no
. 2020.01.04 17:31:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1496::/64 -> fde6:7a:7d20:1496::1028 metric 0) dev Ethernet
. 2020.01.04 17:31:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:31:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.156 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:31:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.04 17:31:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1496::1 metric -1) dev Ethernet
. 2020.01.04 17:31:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:31:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:31:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.04 17:31:23 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.04 17:31:23 - DNS leak protection with packet filtering enabled.
. 2020.01.04 17:31:24 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.24.150.1)
. 2020.01.04 17:31:24 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1496::1)
. 2020.01.04 17:31:24 - Routes, added a new route, 213.152.162.154 for gateway 10.24.150.1
. 2020.01.04 17:31:24 - Routes, added a new route, 2a00:1678:2470:5:3568:e603:2b4d:aeb6 for gateway fde6:7a:7d20:1496::1
. 2020.01.04 17:31:24 - Flushing DNS
I 2020.01.04 17:31:28 - Checking route IPv4
. 2020.01.04 17:31:48 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:31:48 - Checking route (2° try)
I 2020.01.04 17:32:04 - Checking route IPv6
. 2020.01.04 17:32:25 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:32:25 - Checking route (2° try)
. 2020.01.04 17:32:46 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:32:46 - Checking route (3° try)
I 2020.01.04 17:32:56 - Checking DNS
. 2020.01.04 17:33:17 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.04 17:33:17 - Checking DNS (2° try)
! 2020.01.04 17:33:27 - Connected.
. 2020.01.04 17:33:27 - OpenVPN > Initialization Sequence Completed
! 2020.01.04 17:35:16 - Disconnecting
. 2020.01.04 17:35:16 - Routes, removed a route previously added, 213.152.162.154 for gateway 10.24.150.1
. 2020.01.04 17:35:16 - Routes, removed a route previously added, 2a00:1678:2470:5:3568:e603:2b4d:aeb6 for gateway fde6:7a:7d20:1496::1
. 2020.01.04 17:35:16 - Sending management termination signal
. 2020.01.04 17:35:16 - Management - Send 'signal SIGTERM'
. 2020.01.04 17:35:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.04 17:35:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.156 MASK 255.255.255.255 192.168.1.1
. 2020.01.04 17:35:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:35:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.150.1
. 2020.01.04 17:35:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.04 17:35:21 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2020.01.04 17:35:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:35:21 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:35:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:35:21 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2020.01.04 17:35:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:35:21 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2020.01.04 17:35:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.04 17:35:21 - OpenVPN > Closing TUN/TAP interface
. 2020.01.04 17:35:21 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1496::/64)
. 2020.01.04 17:35:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1496::/64 interface=10 fe80::8 store=active
. 2020.01.04 17:35:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1496::1028 store=active
. 2020.01.04 17:35:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.04 17:35:21 - OpenVPN > TAP: DHCP address released
. 2020.01.04 17:35:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.04 17:35:22 - Connection terminated.
. 2020.01.04 17:35:22 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:35:22 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.04 17:35:22 - DNS leak protection with packet filtering disabled.
. 2020.01.04 17:35:22 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.04 17:35:22 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
. 2020.01.04 17:35:22 - Flushing DNS
! 2020.01.04 17:35:25 - Session terminated.
. 2020.01.04 17:41:14 - Updating systems & servers data ...
. 2020.01.04 17:41:15 - Systems & servers data update completed
. 2020.01.04 17:51:25 - Updating systems & servers data ...
. 2020.01.04 17:51:26 - Systems & servers data update completed
. 2020.01.04 18:01:29 - Updating systems & servers data ...
. 2020.01.04 18:01:30 - Systems & servers data update completed
. 2020.01.04 18:11:32 - Updating systems & servers data ...
. 2020.01.04 18:11:33 - Systems & servers data update completed
. 2020.01.04 18:21:36 - Updating systems & servers data ...
. 2020.01.04 18:21:37 - Systems & servers data update completed
. 2020.01.04 18:31:40 - Updating systems & servers data ...
. 2020.01.04 18:31:41 - Systems & servers data update completed
. 2020.01.04 18:42:08 - Updating systems & servers data ...
. 2020.01.04 18:42:09 - Systems & servers data update completed
. 2020.01.04 18:52:15 - Updating systems & servers data ...
. 2020.01.04 18:52:15 - Systems & servers data update completed
. 2020.01.04 19:02:24 - Updating systems & servers data ...
. 2020.01.04 19:02:25 - Systems & servers data update completed
. 2020.01.04 19:12:45 - Updating systems & servers data ...
. 2020.01.04 19:12:46 - Systems & servers data update completed
. 2020.01.04 19:22:52 - Updating systems & servers data ...
. 2020.01.04 19:22:53 - Systems & servers data update completed
. 2020.01.04 19:32:57 - Updating systems & servers data ...
. 2020.01.04 19:32:57 - Systems & servers data update completed
. 2020.01.04 19:43:01 - Updating systems & servers data ...
. 2020.01.04 19:43:02 - Systems & servers data update completed
. 2020.01.04 19:53:05 - Updating systems & servers data ...
. 2020.01.04 19:53:06 - Systems & servers data update completed
. 2020.01.04 20:03:09 - Updating systems & servers data ...
. 2020.01.04 20:03:10 - Systems & servers data update completed
. 2020.01.04 20:13:14 - Updating systems & servers data ...
. 2020.01.04 20:13:15 - Systems & servers data update completed
. 2020.01.04 20:23:18 - Updating systems & servers data ...
. 2020.01.04 20:23:19 - Systems & servers data update completed
. 2020.01.04 20:33:22 - Updating systems & servers data ...
. 2020.01.04 20:33:23 - Systems & servers data update completed
. 2020.01.04 20:43:26 - Updating systems & servers data ...
. 2020.01.04 20:43:27 - Systems & servers data update completed
. 2020.01.04 20:53:30 - Updating systems & servers data ...
. 2020.01.04 20:53:31 - Systems & servers data update completed
. 2020.01.04 21:03:35 - Updating systems & servers data ...
. 2020.01.04 21:03:36 - Systems & servers data update completed
. 2020.01.04 21:13:39 - Updating systems & servers data ...
. 2020.01.04 21:13:40 - Systems & servers data update completed
. 2020.01.04 21:23:44 - Updating systems & servers data ...
. 2020.01.04 21:23:44 - Systems & servers data update completed
. 2020.01.04 21:33:48 - Updating systems & servers data ...
. 2020.01.04 21:33:49 - Systems & servers data update completed
. 2020.01.04 21:43:51 - Updating systems & servers data ...
. 2020.01.04 21:43:52 - Systems & servers data update completed
. 2020.01.04 21:53:55 - Updating systems & servers data ...
. 2020.01.04 21:53:56 - Systems & servers data update completed
. 2020.01.04 22:04:00 - Updating systems & servers data ...
. 2020.01.04 22:04:01 - Systems & servers data update completed
. 2020.01.04 22:14:04 - Updating systems & servers data ...
. 2020.01.04 22:14:04 - Systems & servers data update completed
. 2020.01.04 22:24:08 - Updating systems & servers data ...
. 2020.01.04 22:24:09 - Systems & servers data update completed
. 2020.01.04 22:34:12 - Updating systems & servers data ...
. 2020.01.04 22:34:13 - Systems & servers data update completed
. 2020.01.04 22:44:16 - Updating systems & servers data ...
. 2020.01.04 22:44:17 - Systems & servers data update completed
. 2020.01.04 22:54:20 - Updating systems & servers data ...
. 2020.01.04 22:54:20 - Systems & servers data update completed
. 2020.01.04 23:04:23 - Updating systems & servers data ...
. 2020.01.04 23:04:24 - Systems & servers data update completed
. 2020.01.04 23:14:27 - Updating systems & servers data ...
. 2020.01.04 23:14:28 - Systems & servers data update completed
. 2020.01.04 23:24:31 - Updating systems & servers data ...
. 2020.01.04 23:24:31 - Systems & servers data update completed
. 2020.01.05 02:34:36 - Updating systems & servers data ...
. 2020.01.05 06:12:31 - Systems & servers data update completed
. 2020.01.05 06:13:43 - Updating systems & servers data ...
. 2020.01.05 06:13:45 - Systems & servers data update completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "192.168.1.1",
            "metric": "50"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "192.168.1.0\/24",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "192.168.1.101",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "192.168.1.255",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "255.255.255.255",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "::1",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "fe80::\/64",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "fe80::140b:aff5:b62f:2bb1",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "ff00::\/8",
            "interface": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "2001:ac8:20:97:d4c3:f181:d57a:8d19",
            "gateway": "fde6:7a:7d20:1576::1",
            "metric": "4294967295"
        }
    ],
    "interfaces": [
        {
            "friendly": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 1",
            "id": "{2ED290B2-4692-4272-9326-D6042C4CB1F3}",
            "name": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 1",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::f449:3f2:31cc:92d0",
                "169.254.146.208"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 2",
            "id": "{4CC9BF1E-7E7F-4243-90D4-AAD90E2E1186}",
            "name": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 2",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #2",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::c00d:aac0:62ed:b80d",
                "169.254.184.13"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{81D4A21E-0EE2-49B7-BA15-6A88A00B3520}",
            "name": "Ethernet",
            "description": "TAP-Windows Adapter V9",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::9da9:e985:7b5b:8254",
                "169.254.130.84"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Wi-Fi",
            "id": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}",
            "name": "Wi-Fi",
            "description": "Broadcom 802.11ac Network Adapter",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "2011415326",
            "bytes_sent": "64541430",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::140b:aff5:b62f:2bb1",
                "192.168.1.101"
            ],
            "gateways": [
                "192.168.1.1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Bluetooth A\u011f Ba\u011flant\u0131s\u0131",
            "id": "{8552FDB3-7ABC-4C0D-8D51-70931238C49B}",
            "name": "Bluetooth A\u011f Ba\u011flant\u0131s\u0131",
            "description": "Bluetooth Device (Personal Area Network)",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::386f:e0db:7df9:4121",
                "169.254.65.33"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{253B9F6B-28F1-11EA-B5B7-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "192.168.1.1",
    "ipv4-default-interface": "{89DCF1D2-9DE0-4C12-932D-02B46A3D9A5F}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : DESKTOP-P70QS49
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Wireless LAN adapter Yerel A§ Ba§lants* 1:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : AE-D1-B8-DF-7E-BF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Yerel A§ Ba§lants* 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : AE-D1-B8-DF-76-BF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-81-D4-A2-1E
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Broadcom 802.11ac Network Adapter
   Physical Address. . . . . . . . . : AC-D1-B8-DF-7E-BF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::140b:aff5:b62f:2bb1%13(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.1.101(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : 5 Ocak 2020 Pazar 06:12:40
   Lease Expires . . . . . . . . . . : 5 Ocak 2020 Pazar 07:12:40
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 111989176
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-98-7B-28-AC-D1-B8-DF-7E-BF
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth A§ Ba§lants:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : AC-D1-B8-DF-7E-C0
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Edited ... by giganerd
LOG formatting

Share this post


Link to post

Huh. Similar setups – Eddie 2.16.x on Windows 10, IPv6 supposedly supported but the filter doesn't work, wireless connection.
Are you able to test a LAN cable? If yes, can you test a connection with it? Disconnect wireless, of course. :)


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

its been long time since i last used an ethernet cable. i look everywhere and found an old one. guess what! my laptop doesnt have a 'standart' ethernet port. maybe one of those holes is a 'mini ethernet port'. i dont know which one is, didnt google to see which one is, because i dont have an adapter for it. i have to solve this via wifi since the modem is 2 rooms further.

any solutions on your minds?

(can IPv6 be turned off for good? what would be the consequences?)

Share this post


Link to post
Posted ... (edited)
On 1/5/2020 at 3:45 PM, selavi said:

(can IPv6 be turned off for good? what would be the consequences?) 


Yes, it is possible. On each network interface go to Properties. Uncheck IPv6 in the list there and click OK.

The consequences are that you will have no IPv6 connectivity, so you won't be able to reach anything that is only reachable via IPv6 (which is an extremely short list, most services still operate on v4 only and some are running Dual Stack, which is v4 and v6 in parallel). But you also avoid some of the privacy concerns (IPv6 can be used to track you because without Privacy Extensions your v6 is always fixed and with them it's still unique, as in, no one else in the world has the same; in v4 the same address can at least be any device in your network, usually) and also one or two possibilities for attack (as described in an old thread here). Edited ... by giganerd
typo

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
1 hour ago, giganerd said:

Yes, it is possible. On each network interface go to Properties. Uncheck IPv6 in the list there and click OK.

The consequences are that you will have no IPv6 connectivity, so you won't be able to reach anything that is only reachable via IPv6 (which is an extremely short list, most services still operate on v4 only and some are running Dual Stack, which is v4 and v6 in parallel). But you also avoid some of the privacy concerns (IPv6 can be used to track you because without Privacy Extensions your v6 is always fixed and with them it's still unique, as in, no one else in the world has the same; in v4 the same address can at least be any device in your network, usually) and also one or two possibilities for attack (as described in an old thread here).

thank you for your detailed answer but this didnt solve my problem. i now ordered a usb to ethernet adaptor and will try if this works. if not i will try to downgrade to win 8.1.

Share this post


Link to post
Posted ... (edited)

Hey there,

as of the last two Win10-updates (KB4532936 and KB448730) yesterday got installed today, I can no longer connect to AirVPN.
What I tried so far, albeit without success so far:

  • Disable driver update, uninstall TAP driver, reinstall
  • Uninstall Eddie (latest beta), reset windows firewall rules, reinstall Eddie (with and without updating TAP drivers)
  • lots of loggin out and in, reboots and general despair :D
Loggy-McLogface is attached. Any takers?

Thanks!

Eddie System/Environment Report - 17.01.2020 - 09:49 UTC


 

Eddie version: 2.18.5beta

Eddie OS build: windows_x64

Eddie architecture: x64

OS type: Windows

OS name: Windows 10 Pro

OS version: Microsoft Windows NT 10.0.17134.0

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: TAP-Windows Adapter V9, version 9.23.3

OpenVPN: 2.4.7 - OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)

SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)

SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)

curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)

Profile path: C:\Users\Raphael\AppData\Local\Eddie\default.profile

Data path: C:\Users\Raphael\AppData\Local\Eddie

Application path: C:\Program Files\AirVPN

Executable path: C:\Program Files\AirVPN\Eddie-UI.exe

Command line arguments: (1 args) path="home"

Network Lock Active: No

Connected to VPN: No

Detected DNS: 194.95.154.91, 194.95.154.92

Test DNS IPv4: Ok

Test DNS IPv6: Failed

Test Ping IPv4: 22 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Failed to connect to 2a03:b0c0:2:d0::11b4:6001 port 80: Network unreachable

Test HTTPS: Ok

----------------------------

Important options not at defaults:


 

login: (omissis)

password: (omissis)

remember: True

routes.custom: 74.118.139.154,out,GGn

ui.unit: bytes


 

----------------------------

Logs:


 

. 2020.01.17 10:47:07 - Eddie version: 2.18.5beta / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319

. 2020.01.17 10:47:07 - Command line arguments (1): path="home"

. 2020.01.17 10:47:07 - Profile path: C:\Users\Raphael\AppData\Local\Eddie\default.profile

. 2020.01.17 10:47:07 - Reading options from C:\Users\Raphael\AppData\Local\Eddie\default.profile

. 2020.01.17 10:47:09 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.23.3

. 2020.01.17 10:47:09 - OpenVPN - Version: 2.4.7 - OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)

. 2020.01.17 10:47:09 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)

. 2020.01.17 10:47:09 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)

. 2020.01.17 10:47:09 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)

. 2020.01.17 10:47:09 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem

. 2020.01.17 10:47:10 - Recovery. Unexpected crash?

. 2020.01.17 10:47:10 - Routes, added a new route, 213.152.161.149 for gateway 10.32.230.1

. 2020.01.17 10:47:10 - Routes, added a new route, 2a00:1678:2470:3:7777:3622:2fe6:5066 for gateway fde6:7a:7d20:1ce6::1

I 2020.01.17 10:47:10 - Ready

. 2020.01.17 10:47:11 - Collect information about AirVPN completed

I 2020.01.17 10:47:25 - Session starting.

I 2020.01.17 10:47:25 - Checking authorization ...

! 2020.01.17 10:47:25 - Connecting to Tiaki (Netherlands, Alblasserdam)

. 2020.01.17 10:47:25 - Routes, added a new route, 74.118.139.154 for gateway 192.168.16.254

. 2020.01.17 10:47:26 - OpenVPN > OpenVPN 2.4.7 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019

. 2020.01.17 10:47:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2020.01.17 10:47:26 - OpenVPN > library versions: OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10

. 2020.01.17 10:47:26 - Connection to OpenVPN Management Interface

. 2020.01.17 10:47:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2020.01.17 10:47:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2020.01.17 10:47:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2020.01.17 10:47:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2020.01.17 10:47:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2020.01.17 10:47:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.237:443

. 2020.01.17 10:47:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2020.01.17 10:47:26 - OpenVPN > UDP link local: (not bound)

. 2020.01.17 10:47:26 - OpenVPN > UDP link remote: [AF_INET]134.19.179.237:443

. 2020.01.17 10:47:26 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.237:443, sid=20505439 7e181c86

. 2020.01.17 10:47:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2020.01.17 10:47:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2020.01.17 10:47:26 - OpenVPN > VERIFY KU OK

. 2020.01.17 10:47:26 - OpenVPN > Validating certificate extended key usage

. 2020.01.17 10:47:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2020.01.17 10:47:26 - OpenVPN > VERIFY EKU OK

. 2020.01.17 10:47:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tiaki, emailAddress=info@airvpn.org

. 2020.01.17 10:47:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2020.01.17 10:47:26 - OpenVPN > [Tiaki] Peer Connection Initiated with [AF_INET]134.19.179.237:443

. 2020.01.17 10:47:27 - OpenVPN > SENT CONTROL [Tiaki]: 'PUSH_REQUEST' (status=1)

. 2020.01.17 10:47:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.166.1,dhcp-option DNS6 fde6:7a:7d20:1ea6::1,tun-ipv6,route-gateway 10.34.166.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1ea6::1038/64 fde6:7a:7d20:1ea6::1,ifconfig 10.34.166.58 255.255.255.0,peer-id 0,cipher AES-256-GCM'

. 2020.01.17 10:47:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2020.01.17 10:47:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2020.01.17 10:47:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2020.01.17 10:47:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2020.01.17 10:47:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2020.01.17 10:47:27 - OpenVPN > interactive service msg_channel=0

. 2020.01.17 10:47:27 - OpenVPN > ROUTE_GATEWAY 192.168.16.254/255.255.255.0 I=13 HWADDR=50:5b:c2:a1:f7:7d

. 2020.01.17 10:47:27 - OpenVPN > ROUTE: bypass_host_route[0]=194.95.154.91

. 2020.01.17 10:47:27 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2020.01.17 10:47:27 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element nicht gefunden. (code=1168)

. 2020.01.17 10:47:27 - OpenVPN > ROUTE6: default_gateway=UNDEF

. 2020.01.17 10:47:27 - OpenVPN > open_tun

. 2020.01.17 10:47:27 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{FF44E21F-6BAD-4F39-8908-FDC2594A1171}.tap

. 2020.01.17 10:47:27 - OpenVPN > TAP-Windows Driver Version 9.23

. 2020.01.17 10:47:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.34.166.0/10.34.166.58/255.255.255.0 [SUCCEEDED]

. 2020.01.17 10:47:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.34.166.58/255.255.255.0 on interface {FF44E21F-6BAD-4F39-8908-FDC2594A1171} [DHCP-serv: 10.34.166.254, lease-time: 31536000]

. 2020.01.17 10:47:27 - OpenVPN > Successful ARP Flush on interface [51] {FF44E21F-6BAD-4F39-8908-FDC2594A1171}

. 2020.01.17 10:47:28 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=51 fde6:7a:7d20:1ea6::1038 store=active

. 2020.01.17 10:47:29 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1ea6::1 validate=no

. 2020.01.17 10:47:29 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1ea6::/64 -> fde6:7a:7d20:1ea6::1038 metric 0) dev Ethernet 2

. 2020.01.17 10:47:29 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1ea6::/64 interface=51 fe80::8 store=active

. 2020.01.17 10:47:29 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:47:34 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\route.exe ADD 134.19.179.237 MASK 255.255.255.255 192.168.16.254

. 2020.01.17 10:47:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4

. 2020.01.17 10:47:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\route.exe ADD 194.95.154.91 MASK 255.255.255.255 192.168.16.254

. 2020.01.17 10:47:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4

. 2020.01.17 10:47:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.34.166.1

. 2020.01.17 10:47:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2020.01.17 10:47:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.34.166.1

. 2020.01.17 10:47:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2020.01.17 10:47:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2020.01.17 10:47:34 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1ea6::1 metric -1) dev Ethernet 2

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=51 fe80::8 store=active

. 2020.01.17 10:47:34 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:47:34 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1ea6::1 metric -1) dev Ethernet 2

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=51 fe80::8 store=active

. 2020.01.17 10:47:34 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:47:34 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1ea6::1 metric -1) dev Ethernet 2

. 2020.01.17 10:47:34 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=51 fe80::8 store=active

. 2020.01.17 10:47:34 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:47:35 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1ea6::1 metric -1) dev Ethernet 2

. 2020.01.17 10:47:35 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=51 fe80::8 store=active

. 2020.01.17 10:47:35 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:47:35 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4

. 2020.01.17 10:47:35 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6

. 2020.01.17 10:47:35 - DNS leak protection with packet filtering enabled.

. 2020.01.17 10:47:35 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.34.166.1)

. 2020.01.17 10:47:35 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1ea6::1)

. 2020.01.17 10:47:35 - Routes, added a new route, 134.19.179.235 for gateway 10.34.166.1

. 2020.01.17 10:47:35 - Routes, added a new route, 2a00:1678:2470:1616:aeb9:c892:ad0d:ba5a for gateway fde6:7a:7d20:1ea6::1

. 2020.01.17 10:47:35 - Flushing DNS

I 2020.01.17 10:47:38 - Checking route IPv4

. 2020.01.17 10:47:58 - curl: (28) Operation timed out after 20016 milliseconds with 0 out of 0 bytes received

. 2020.01.17 10:47:58 - Checking route (2° try)

. 2020.01.17 10:48:19 - curl: (28) Operation timed out after 20016 milliseconds with 0 out of 0 bytes received

. 2020.01.17 10:48:19 - Checking route (3° try)

. 2020.01.17 10:48:42 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received

E 2020.01.17 10:48:42 - Checking route IPv4 failed.

. 2020.01.17 10:48:42 - OpenVPN > Initialization Sequence Completed

! 2020.01.17 10:48:42 - Disconnecting

. 2020.01.17 10:48:42 - Routes, removed a route previously added, 74.118.139.154 for gateway 192.168.16.254

. 2020.01.17 10:48:42 - Routes, removed a route previously added, 134.19.179.235 for gateway 10.34.166.1

. 2020.01.17 10:48:42 - Routes, removed a route previously added, 2a00:1678:2470:1616:aeb9:c892:ad0d:ba5a for gateway fde6:7a:7d20:1ea6::1

. 2020.01.17 10:48:42 - Sending management termination signal

. 2020.01.17 10:48:42 - Management - Send 'signal SIGTERM'

. 2020.01.17 10:48:42 - OpenVPN > MANAGEMENT: CMD '798a27a9ae98180d3d46bfc2d1384b11f2324d0ec26c0ad30dad3633aea88b4d'

. 2020.01.17 10:48:51 - Sending management termination signal

. 2020.01.17 10:48:51 - Management - Send 'signal SIGTERM'

. 2020.01.17 10:48:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2020.01.17 10:48:51 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 134.19.179.237 MASK 255.255.255.255 192.168.16.254

. 2020.01.17 10:48:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 194.95.154.91 MASK 255.255.255.255 192.168.16.254

. 2020.01.17 10:48:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.34.166.1

. 2020.01.17 10:48:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.34.166.1

. 2020.01.17 10:48:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2020.01.17 10:48:56 - OpenVPN > delete_route_ipv6(::/3)

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 interface=51 fe80::8 store=active

. 2020.01.17 10:48:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:48:56 - OpenVPN > delete_route_ipv6(2000::/4)

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=51 fe80::8 store=active

. 2020.01.17 10:48:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:48:56 - OpenVPN > delete_route_ipv6(3000::/4)

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=51 fe80::8 store=active

. 2020.01.17 10:48:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:48:56 - OpenVPN > delete_route_ipv6(fc00::/7)

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=51 fe80::8 store=active

. 2020.01.17 10:48:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2020.01.17 10:48:56 - OpenVPN > Closing TUN/TAP interface

. 2020.01.17 10:48:56 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1ea6::/64)

. 2020.01.17 10:48:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1ea6::/64 interface=51 fe80::8 store=active

. 2020.01.17 10:48:56 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1ea6::1038 store=active

. 2020.01.17 10:48:56 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all

. 2020.01.17 10:48:56 - OpenVPN > TAP: DHCP address released

. 2020.01.17 10:48:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2020.01.17 10:48:56 - Connection terminated.

. 2020.01.17 10:48:56 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)

. 2020.01.17 10:48:56 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)

. 2020.01.17 10:48:56 - DNS leak protection with packet filtering disabled.

. 2020.01.17 10:48:56 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4

. 2020.01.17 10:48:56 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6

I 2020.01.17 10:48:57 - Cancel requested.

! 2020.01.17 10:48:57 - Session terminated.


 

----------------------------

Network Interfaces and Routes:


 

{

"support_ipv4": true,

"support_ipv6": true,

"routes": [

{

"address": "0.0.0.0\/0",

"interface": "{7C0D2694-9795-4081-A1E0-FD287A04A7B8}",

"gateway": "192.168.16.254",

"metric": "45"

},

{

"address": "2a00:1678:2470:3:7777:3622:2fe6:5066",

"gateway": "fde6:7a:7d20:1ce6::1",

"metric": "4294967295"

}

],

"interfaces": [

{

"friendly": "Ethernet",

"id": "{677F509A-111E-4B38-B241-44740E64CFB3}",

"name": "Ethernet",

"description": "Realtek PCIe GBE Family Controller",

"type": "Ethernet",

"status": "Down",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::a1e6:7cbf:18a:db2b",

"169.254.219.43"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "Ethernet 2",

"id": "{FF44E21F-6BAD-4F39-8908-FDC2594A1171}",

"name": "Ethernet 2",

"description": "TAP-Windows Adapter V9",

"type": "Ethernet",

"status": "Down",

"bytes_received": "228338",

"bytes_sent": "377899",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::7d46:21ef:9f7c:f76d",

"169.254.247.109"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "VirtualBox Host-Only Network",

"id": "{DF5A262F-FB45-4A5B-89FB-D44723DBF7FB}",

"name": "VirtualBox Host-Only Network",

"description": "VirtualBox Host-Only Ethernet Adapter",

"type": "Ethernet",

"status": "Up",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::14ce:484c:ed26:3fd0",

"192.168.56.1"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "LAN-Verbindung* 1",

"id": "{096389CF-AFA3-43FF-87F3-1F9B6F7B8142}",

"name": "LAN-Verbindung* 1",

"description": "Microsoft Wi-Fi Direct Virtual Adapter",

"type": "Wireless80211",

"status": "Down",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::42d:66f0:319b:851",

"169.254.8.81"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "LAN-Verbindung* 3",

"id": "{862712BF-B189-4DF2-BE52-9CFDD2525BF1}",

"name": "LAN-Verbindung* 3",

"description": "Microsoft Wi-Fi Direct Virtual Adapter #2",

"type": "Wireless80211",

"status": "Down",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::f131:7ef7:7199:ff4a",

"169.254.255.74"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "VMware Network Adapter VMnet1",

"id": "{7AD4D048-DC69-41A5-93B9-21CFF5D12A3A}",

"name": "VMware Network Adapter VMnet1",

"description": "VMware Virtual Ethernet Adapter for VMnet1",

"type": "Ethernet",

"status": "Up",

"bytes_received": "2",

"bytes_sent": "706",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::dcc4:7e37:2165:12b9",

"192.168.163.1"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "VMware Network Adapter VMnet8",

"id": "{2BC673F4-5CD3-4020-A16D-FE8FF23D6D6F}",

"name": "VMware Network Adapter VMnet8",

"description": "VMware Virtual Ethernet Adapter for VMnet8",

"type": "Ethernet",

"status": "Up",

"bytes_received": "3",

"bytes_sent": "805",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::bc0c:bd8a:5990:2cc",

"192.168.195.1"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "WLAN",

"id": "{7C0D2694-9795-4081-A1E0-FD287A04A7B8}",

"name": "WLAN",

"description": "Qualcomm Atheros QCA9377 Wireless Network Adapter",

"type": "Wireless80211",

"status": "Up",

"bytes_received": "10101039",

"bytes_sent": "3164512",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::a4b2:17dc:7d4:725a",

"192.168.16.120"

],

"gateways": [

"192.168.16.254"

],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "Bluetooth-Netzwerkverbindung",

"id": "{F2047248-EBFA-4336-A97D-1833EA8390EE}",

"name": "Bluetooth-Netzwerkverbindung",

"description": "Bluetooth Device (Personal Area Network)",

"type": "Ethernet",

"status": "Down",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"fe80::1d13:109a:6b69:fb68",

"169.254.251.104"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

},

{

"friendly": "Loopback Pseudo-Interface 1",

"id": "{854CC57F-DC88-11E8-ACC4-806E6F6E6963}",

"name": "Loopback Pseudo-Interface 1",

"description": "Software Loopback Interface 1",

"type": "Loopback",

"status": "Up",

"bytes_received": "0",

"bytes_sent": "0",

"support_ipv4": true,

"support_ipv6": true,

"ips": [

"::1",

"127.0.0.1"

],

"gateways": [],

"bind": true,

"dns4": "",

"dns6": null

}

],

"ipv4-default-gateway": "192.168.16.254",

"ipv4-default-interface": "{7C0D2694-9795-4081-A1E0-FD287A04A7B8}"

}

----------------------------

ipconfig /all:


 

Windows-IP-Konfiguration


 

Hostname . . . . . . . . . . . . : Schleppi

Prim„res DNS-Suffix . . . . . . . :

Knotentyp . . . . . . . . . . . . : Peer-Peer

IP-Routing aktiviert . . . . . . : Nein

WINS-Proxy aktiviert . . . . . . : Nein


 

Ethernet-Adapter Ethernet:


 

Medienstatus. . . . . . . . . . . : Medium getrennt

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : Realtek PCIe GBE Family Controller

Physische Adresse . . . . . . . . : 98-28-A6-19-33-62

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja


 

Ethernet-Adapter Ethernet 2:


 

Medienstatus. . . . . . . . . . . : Medium getrennt

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : TAP-Windows Adapter V9

Physische Adresse . . . . . . . . : 00-FF-FF-44-E2-1F

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja


 

Ethernet-Adapter VirtualBox Host-Only Network:


 

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter

Physische Adresse . . . . . . . . : 0A-00-27-00-00-18

DHCP aktiviert. . . . . . . . . . : Nein

Autokonfiguration aktiviert . . . : Ja

Verbindungslokale IPv6-Adresse . : fe80::14ce:484c:ed26:3fd0%24(Bevorzugt)

IPv4-Adresse . . . . . . . . . . : 192.168.56.1(Bevorzugt)

Subnetzmaske . . . . . . . . . . : 255.255.255.0

Standardgateway . . . . . . . . . :

DHCPv6-IAID . . . . . . . . . . . : 772407335

DHCPv6-Client-DUID. . . . . . . . : 00-01-00-01-23-6A-82-75-98-28-A6-19-33-62

DNS-Server . . . . . . . . . . . : fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

NetBIOS ber TCP/IP . . . . . . . : Aktiviert


 

Drahtlos-LAN-Adapter LAN-Verbindung* 1:


 

Medienstatus. . . . . . . . . . . : Medium getrennt

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter

Physische Adresse . . . . . . . . : 52-5B-C2-A1-F7-7D

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja


 

Drahtlos-LAN-Adapter LAN-Verbindung* 3:


 

Medienstatus. . . . . . . . . . . : Medium getrennt

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2

Physische Adresse . . . . . . . . : 62-5B-C2-A1-F7-7D

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja


 

Ethernet-Adapter VMware Network Adapter VMnet1:


 

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1

Physische Adresse . . . . . . . . : 00-50-56-C0-00-01

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja

Verbindungslokale IPv6-Adresse . : fe80::dcc4:7e37:2165:12b9%12(Bevorzugt)

IPv4-Adresse . . . . . . . . . . : 192.168.163.1(Bevorzugt)

Subnetzmaske . . . . . . . . . . : 255.255.255.0

Lease erhalten. . . . . . . . . . : Freitag, 17. Januar 2020 10:37:09

Lease l„uft ab. . . . . . . . . . : Freitag, 17. Januar 2020 11:07:09

Standardgateway . . . . . . . . . :

DHCP-Server . . . . . . . . . . . : 192.168.163.254

DHCPv6-IAID . . . . . . . . . . . : 922767446

DHCPv6-Client-DUID. . . . . . . . : 00-01-00-01-23-6A-82-75-98-28-A6-19-33-62

DNS-Server . . . . . . . . . . . : fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

NetBIOS ber TCP/IP . . . . . . . : Aktiviert


 

Ethernet-Adapter VMware Network Adapter VMnet8:


 

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8

Physische Adresse . . . . . . . . : 00-50-56-C0-00-08

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja

Verbindungslokale IPv6-Adresse . : fe80::bc0c:bd8a:5990:2cc%6(Bevorzugt)

IPv4-Adresse . . . . . . . . . . : 192.168.195.1(Bevorzugt)

Subnetzmaske . . . . . . . . . . : 255.255.255.0

Lease erhalten. . . . . . . . . . : Freitag, 17. Januar 2020 10:37:09

Lease l„uft ab. . . . . . . . . . : Freitag, 17. Januar 2020 11:07:09

Standardgateway . . . . . . . . . :

DHCP-Server . . . . . . . . . . . : 192.168.195.254

DHCPv6-IAID . . . . . . . . . . . : 939544662

DHCPv6-Client-DUID. . . . . . . . : 00-01-00-01-23-6A-82-75-98-28-A6-19-33-62

DNS-Server . . . . . . . . . . . : fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

Prim„rer WINS-Server. . . . . . . : 192.168.195.2

NetBIOS ber TCP/IP . . . . . . . : Aktiviert


 

Drahtlos-LAN-Adapter WLAN:


 

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : Qualcomm Atheros QCA9377 Wireless Network Adapter

Physische Adresse . . . . . . . . : 50-5B-C2-A1-F7-7D

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja

Verbindungslokale IPv6-Adresse . : fe80::a4b2:17dc:7d4:725a%13(Bevorzugt)

IPv4-Adresse . . . . . . . . . . : 192.168.16.120(Bevorzugt)

Subnetzmaske . . . . . . . . . . : 255.255.255.0

Lease erhalten. . . . . . . . . . : Freitag, 17. Januar 2020 10:37:21

Lease l„uft ab. . . . . . . . . . : Samstag, 18. Januar 2020 10:37:21

Standardgateway . . . . . . . . . : 192.168.16.254

DHCP-Server . . . . . . . . . . . : 194.95.154.91

DHCPv6-IAID . . . . . . . . . . . : 122706882

DHCPv6-Client-DUID. . . . . . . . : 00-01-00-01-23-6A-82-75-98-28-A6-19-33-62

DNS-Server . . . . . . . . . . . : 194.95.154.91

194.95.154.92

NetBIOS ber TCP/IP . . . . . . . : Deaktiviert


 

Ethernet-Adapter Bluetooth-Netzwerkverbindung:


 

Medienstatus. . . . . . . . . . . : Medium getrennt

Verbindungsspezifisches DNS-Suffix:

Beschreibung. . . . . . . . . . . : Bluetooth Device (Personal Area Network)

Physische Adresse . . . . . . . . : 50-5B-C2-A1-F7-7E

DHCP aktiviert. . . . . . . . . . : Ja

Autokonfiguration aktiviert . . . : Ja

 

Edited ... by giganerd
Pasted logs from .docx file to LOG format

Share this post


Link to post

Very similar setup yielding the same problem as a few others. I will merge your topic with the rest.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
Posted ... (edited)

i bougt an ethernet to usb adaptor. i am wired now.
it seems i am connected to airvn (eddie is connected now). but the weird thing is, i can only browse inside airvpn! all other web sites fail to load. i think the connection is way too slow. here is my new log-please help me:

. 2020.01.18 10:38:30 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home Single Language, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.01.18 10:38:30 - Reading options from C:\Program Files\AirVPN\default.xml
. 2020.01.18 10:38:31 - Command line arguments (0):
. 2020.01.18 10:38:31 - Profile path: C:\Program Files\AirVPN\default.xml
. 2020.01.18 10:38:33 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2020.01.18 10:38:33 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.01.18 10:38:33 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.01.18 10:38:33 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.01.18 10:38:33 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2020.01.18 10:38:33 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2020.01.18 10:38:33 - Updating systems & servers data ...
I 2020.01.18 10:38:33 - Ready
. 2020.01.18 10:38:34 - Systems & servers data update completed
I 2020.01.18 10:38:42 - Session starting.
I 2020.01.18 10:38:42 - Checking authorization ...
! 2020.01.18 10:38:43 - Connecting to Mirzam (Germany, Frankfurt)
. 2020.01.18 10:38:43 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.18 10:38:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.18 10:38:43 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.18 10:38:43 - Connection to OpenVPN Management Interface
. 2020.01.18 10:38:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.18 10:38:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 10:38:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 10:38:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 10:38:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 10:38:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.181:443
. 2020.01.18 10:38:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.18 10:38:43 - OpenVPN > UDP link local: (not bound)
. 2020.01.18 10:38:43 - OpenVPN > UDP link remote: [AF_INET]141.98.102.181:443
. 2020.01.18 10:38:43 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.181:443, sid=06374bda bf9ea638
. 2020.01.18 10:38:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.18 10:38:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.18 10:38:44 - OpenVPN > VERIFY KU OK
. 2020.01.18 10:38:44 - OpenVPN > Validating certificate extended key usage
. 2020.01.18 10:38:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.18 10:38:44 - OpenVPN > VERIFY EKU OK
. 2020.01.18 10:38:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mirzam, emailAddress=info@airvpn.org
. 2020.01.18 10:38:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.18 10:38:51 - OpenVPN > [Mirzam] Peer Connection Initiated with [AF_INET]141.98.102.181:443
. 2020.01.18 10:38:52 - OpenVPN > SENT CONTROL [Mirzam]: 'PUSH_REQUEST' (status=1)
. 2020.01.18 10:38:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.214.1,dhcp-option DNS6 fde6:7a:7d20:18d6::1,tun-ipv6,route-gateway 10.28.214.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18d6::1089/64 fde6:7a:7d20:18d6::1,ifconfig 10.28.214.139 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.01.18 10:38:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.18 10:38:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.18 10:38:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.18 10:38:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 10:38:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 10:38:53 - OpenVPN > interactive service msg_channel=0
. 2020.01.18 10:38:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=41 HWADDR=00:e0:4c:68:96:e6
. 2020.01.18 10:38:53 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.18 10:38:53 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.18 10:38:53 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.18 10:38:53 - OpenVPN > open_tun
. 2020.01.18 10:38:53 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{194CCD17-FB84-480A-AB50-A6E74222CE09}.tap
. 2020.01.18 10:38:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.18 10:38:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.28.214.0/10.28.214.139/255.255.255.0 [SUCCEEDED]
. 2020.01.18 10:38:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.28.214.139/255.255.255.0 on interface {194CCD17-FB84-480A-AB50-A6E74222CE09} [DHCP-serv: 10.28.214.254, lease-time: 31536000]
. 2020.01.18 10:38:53 - OpenVPN > Successful ARP Flush on interface [37] {194CCD17-FB84-480A-AB50-A6E74222CE09}
. 2020.01.18 10:38:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.18 10:38:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=37 fde6:7a:7d20:18d6::1089 store=active
. 2020.01.18 10:38:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:18d6::1 validate=no
. 2020.01.18 10:38:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:18d6::/64 -> fde6:7a:7d20:18d6::1089 metric 0) dev Ethernet
. 2020.01.18 10:38:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:18d6::/64 interface=37 fe80::8 store=active
. 2020.01.18 10:38:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:39:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.181 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 10:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 10:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.28.214.1
. 2020.01.18 10:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 10:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.28.214.1
. 2020.01.18 10:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 10:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 10:39:00 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:18d6::1 metric -1) dev Ethernet
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 10:39:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:39:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:18d6::1 metric -1) dev Ethernet
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 10:39:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:39:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:18d6::1 metric -1) dev Ethernet
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 10:39:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:39:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:18d6::1 metric -1) dev Ethernet
. 2020.01.18 10:39:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 10:39:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:39:00 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.18 10:39:00 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.18 10:39:00 - DNS leak protection with packet filtering enabled.
. 2020.01.18 10:39:01 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.28.214.1)
. 2020.01.18 10:39:01 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:18d6::1)
. 2020.01.18 10:39:01 - Routes, added a new route, 141.98.102.179 for gateway 10.28.214.1
. 2020.01.18 10:39:01 - Routes, added a new route, 2001:ac8:20:96:9c26:da90:d6ac:47d8 for gateway fde6:7a:7d20:18d6::1
. 2020.01.18 10:39:01 - Flushing DNS
I 2020.01.18 10:39:04 - Checking route IPv4
I 2020.01.18 10:39:11 - Checking route IPv6
I 2020.01.18 10:39:21 - Checking DNS
! 2020.01.18 10:39:30 - Connected.
. 2020.01.18 10:39:30 - OpenVPN > Initialization Sequence Completed
. 2020.01.18 10:41:22 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2020.01.18 10:41:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.181 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 10:41:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 10:41:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.28.214.1
W 2020.01.18 10:41:22 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.28.214.1
. 2020.01.18 10:41:22 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2020.01.18 10:41:22 - OpenVPN > Route deletion fallback to route.exe
. 2020.01.18 10:41:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 10:41:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.28.214.1
W 2020.01.18 10:41:23 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.28.214.1
. 2020.01.18 10:41:23 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2020.01.18 10:41:23 - OpenVPN > Route deletion fallback to route.exe
. 2020.01.18 10:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 13:41:23 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.18 13:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 13:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2020.01.18 13:41:23 - OpenVPN > ERROR: Windows route delete ipv6 command failed: returned error code 1
. 2020.01.18 13:41:23 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.18 13:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 13:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2020.01.18 13:41:24 - OpenVPN > ERROR: Windows route delete ipv6 command failed: returned error code 1
. 2020.01.18 13:41:24 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.18 13:41:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 13:41:24 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2020.01.18 13:41:24 - OpenVPN > ERROR: Windows route delete ipv6 command failed: returned error code 1
. 2020.01.18 13:41:24 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.18 13:41:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 13:41:24 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2020.01.18 13:41:24 - OpenVPN > ERROR: Windows route delete ipv6 command failed: returned error code 1
. 2020.01.18 13:41:24 - OpenVPN > Closing TUN/TAP interface
. 2020.01.18 13:41:24 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:18d6::/64)
. 2020.01.18 13:41:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:18d6::/64 interface=37 fe80::8 store=active
E 2020.01.18 13:41:24 - OpenVPN > ERROR: Windows route delete ipv6 command failed: returned error code 1
. 2020.01.18 13:41:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:18d6::1089 store=active
E 2020.01.18 13:41:24 - OpenVPN > ERROR: netsh command failed: returned error code 1
. 2020.01.18 13:41:24 - OpenVPN > NETSH: command failed
. 2020.01.18 13:41:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.18 13:41:24 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Sistem belirtilen dosyay� bulam�yor.   (code=2)
. 2020.01.18 13:41:24 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2020.01.18 13:41:24 - OpenVPN > Use --help for more information.
! 2020.01.18 13:41:24 - Disconnecting
. 2020.01.18 13:41:25 - Routes, remove 141.98.102.179 for gateway 10.28.214.1 failed: The route deletion failed: Eleman bulunamad
. 2020.01.18 16:01:30 - Routes, removed a route previously added, 2001:ac8:20:96:9c26:da90:d6ac:47d8 for gateway fde6:7a:7d20:18d6::1
. 2020.01.18 16:01:30 - Connection terminated.
. 2020.01.18 16:01:30 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:01:30 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:01:30 - DNS leak protection with packet filtering disabled.
I 2020.01.18 16:01:34 - Checking authorization ...
! 2020.01.18 16:01:35 - Connecting to Ogma (Germany, Frankfurt)
. 2020.01.18 16:01:36 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.18 16:01:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.18 16:01:36 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.18 16:01:36 - Connection to OpenVPN Management Interface
. 2020.01.18 16:01:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.18 16:01:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 16:01:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 16:01:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 16:01:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 16:01:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.21:443
. 2020.01.18 16:01:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.18 16:01:36 - OpenVPN > UDP link local: (not bound)
. 2020.01.18 16:01:36 - OpenVPN > UDP link remote: [AF_INET]185.189.112.21:443
. 2020.01.18 16:01:36 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.21:443, sid=371807fa 7d9ab874
. 2020.01.18 16:01:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.18 16:01:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.18 16:01:37 - OpenVPN > VERIFY KU OK
. 2020.01.18 16:01:37 - OpenVPN > Validating certificate extended key usage
. 2020.01.18 16:01:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.18 16:01:37 - OpenVPN > VERIFY EKU OK
. 2020.01.18 16:01:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ogma, emailAddress=info@airvpn.org
. 2020.01.18 16:01:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.18 16:01:45 - OpenVPN > [Ogma] Peer Connection Initiated with [AF_INET]185.189.112.21:443
. 2020.01.18 16:01:46 - OpenVPN > SENT CONTROL [Ogma]: 'PUSH_REQUEST' (status=1)
. 2020.01.18 16:01:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.182.1,dhcp-option DNS6 fde6:7a:7d20:15b6::1,tun-ipv6,route-gateway 10.25.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15b6::1001/64 fde6:7a:7d20:15b6::1,ifconfig 10.25.182.3 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2020.01.18 16:01:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.18 16:01:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.18 16:01:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.18 16:01:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 16:01:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 16:01:47 - OpenVPN > interactive service msg_channel=0
. 2020.01.18 16:01:47 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=41 HWADDR=00:e0:4c:68:96:e6
. 2020.01.18 16:01:47 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.18 16:01:47 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.18 16:01:47 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.18 16:01:47 - OpenVPN > open_tun
. 2020.01.18 16:01:47 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{194CCD17-FB84-480A-AB50-A6E74222CE09}.tap
. 2020.01.18 16:01:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.18 16:01:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.182.0/10.25.182.3/255.255.255.0 [SUCCEEDED]
. 2020.01.18 16:01:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.182.3/255.255.255.0 on interface {194CCD17-FB84-480A-AB50-A6E74222CE09} [DHCP-serv: 10.25.182.254, lease-time: 31536000]
. 2020.01.18 16:01:47 - OpenVPN > Successful ARP Flush on interface [37] {194CCD17-FB84-480A-AB50-A6E74222CE09}
. 2020.01.18 16:01:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.18 16:01:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=37 fde6:7a:7d20:15b6::1001 store=active
. 2020.01.18 16:01:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:15b6::1 validate=no
. 2020.01.18 16:01:49 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.18 16:01:49 - OpenVPN > add_route_ipv6(fde6:7a:7d20:15b6::/64 -> fde6:7a:7d20:15b6::1001 metric 0) dev Ethernet
. 2020.01.18 16:01:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:15b6::/64 interface=37 fe80::8 store=active
. 2020.01.18 16:01:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:01:53 - Updating systems & servers data ...
. 2020.01.18 16:01:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.189.112.21 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 16:01:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:01:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.182.1
. 2020.01.18 16:01:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:01:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.182.1
. 2020.01.18 16:01:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:01:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:01:54 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:15b6::1 metric -1) dev Ethernet
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 16:01:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:01:54 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:15b6::1 metric -1) dev Ethernet
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:01:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:01:54 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:15b6::1 metric -1) dev Ethernet
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:01:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:01:54 - Systems & servers data update completed
. 2020.01.18 16:01:54 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:15b6::1 metric -1) dev Ethernet
. 2020.01.18 16:01:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 16:01:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:01:54 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.18 16:01:54 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.18 16:01:54 - DNS leak protection with packet filtering enabled.
. 2020.01.18 16:01:54 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.25.182.1)
. 2020.01.18 16:01:54 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:15b6::1)
. 2020.01.18 16:01:54 - Routes, added a new route, 185.189.112.19 for gateway 10.25.182.1
. 2020.01.18 16:01:55 - Routes, added a new route, 2001:ac8:20:2b:1da:26be:a2db:a07c for gateway fde6:7a:7d20:15b6::1
. 2020.01.18 16:01:55 - Flushing DNS
I 2020.01.18 16:01:58 - Checking route IPv4
. 2020.01.18 16:02:18 - curl: (28) Operation timed out after 20015 milliseconds with 0 out of 0 bytes received
. 2020.01.18 16:02:18 - Checking route (2° try)
. 2020.01.18 16:02:39 - curl: (28) Operation timed out after 20016 milliseconds with 0 out of 0 bytes received
. 2020.01.18 16:02:39 - Checking route (3° try)
. 2020.01.18 16:03:01 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
E 2020.01.18 16:03:01 - Checking route IPv4 failed.
. 2020.01.18 16:03:01 - OpenVPN > Initialization Sequence Completed
! 2020.01.18 16:03:01 - Disconnecting
. 2020.01.18 16:03:01 - Routes, removed a route previously added, 185.189.112.19 for gateway 10.25.182.1
. 2020.01.18 16:03:01 - Routes, removed a route previously added, 2001:ac8:20:2b:1da:26be:a2db:a07c for gateway fde6:7a:7d20:15b6::1
. 2020.01.18 16:03:01 - Sending management termination signal
. 2020.01.18 16:03:01 - Management - Send 'signal SIGTERM'
. 2020.01.18 16:03:01 - OpenVPN > MANAGEMENT: CMD 'b55e74b73a788b9fb436382fcb9de2791390f331a58c735a40d80626c5f4f8c3'
. 2020.01.18 16:03:11 - Sending management termination signal
. 2020.01.18 16:03:11 - Management - Send 'signal SIGTERM'
. 2020.01.18 16:03:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.18 16:03:11 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.189.112.21 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 16:03:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.182.1
. 2020.01.18 16:03:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.182.1
. 2020.01.18 16:03:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:16 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 16:03:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:16 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:03:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:16 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:03:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:16 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 16:03:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:16 - OpenVPN > Closing TUN/TAP interface
. 2020.01.18 16:03:16 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:15b6::/64)
. 2020.01.18 16:03:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:15b6::/64 interface=37 fe80::8 store=active
. 2020.01.18 16:03:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:15b6::1001 store=active
. 2020.01.18 16:03:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.18 16:03:17 - OpenVPN > TAP: DHCP address released
. 2020.01.18 16:03:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.18 16:03:17 - Connection terminated.
. 2020.01.18 16:03:17 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:03:17 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:03:17 - DNS leak protection with packet filtering disabled.
. 2020.01.18 16:03:17 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.18 16:03:17 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
I 2020.01.18 16:03:20 - Checking authorization ...
! 2020.01.18 16:03:21 - Connecting to Alsephina (Germany, Frankfurt)
. 2020.01.18 16:03:21 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.18 16:03:21 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.18 16:03:21 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.18 16:03:21 - Connection to OpenVPN Management Interface
. 2020.01.18 16:03:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.18 16:03:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 16:03:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 16:03:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 16:03:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 16:03:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.189:443
. 2020.01.18 16:03:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.18 16:03:21 - OpenVPN > UDP link local: (not bound)
. 2020.01.18 16:03:21 - OpenVPN > UDP link remote: [AF_INET]141.98.102.189:443
. 2020.01.18 16:03:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.18 16:03:21 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.189:443, sid=ed0cbf13 79498779
. 2020.01.18 16:03:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.18 16:03:22 - OpenVPN > VERIFY KU OK
. 2020.01.18 16:03:22 - OpenVPN > Validating certificate extended key usage
. 2020.01.18 16:03:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.18 16:03:22 - OpenVPN > VERIFY EKU OK
. 2020.01.18 16:03:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alsephina, emailAddress=info@airvpn.org
. 2020.01.18 16:03:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.18 16:03:30 - OpenVPN > [Alsephina] Peer Connection Initiated with [AF_INET]141.98.102.189:443
. 2020.01.18 16:03:31 - OpenVPN > SENT CONTROL [Alsephina]: 'PUSH_REQUEST' (status=1)
. 2020.01.18 16:03:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.118.1,dhcp-option DNS6 fde6:7a:7d20:1576::1,tun-ipv6,route-gateway 10.25.118.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1576::10be/64 fde6:7a:7d20:1576::1,ifconfig 10.25.118.192 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.01.18 16:03:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.18 16:03:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.18 16:03:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.18 16:03:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 16:03:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 16:03:32 - OpenVPN > interactive service msg_channel=0
. 2020.01.18 16:03:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=41 HWADDR=00:e0:4c:68:96:e6
. 2020.01.18 16:03:32 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.18 16:03:32 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.18 16:03:32 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.18 16:03:32 - OpenVPN > open_tun
. 2020.01.18 16:03:32 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{194CCD17-FB84-480A-AB50-A6E74222CE09}.tap
. 2020.01.18 16:03:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.18 16:03:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.118.0/10.25.118.192/255.255.255.0 [SUCCEEDED]
. 2020.01.18 16:03:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.118.192/255.255.255.0 on interface {194CCD17-FB84-480A-AB50-A6E74222CE09} [DHCP-serv: 10.25.118.254, lease-time: 31536000]
. 2020.01.18 16:03:32 - OpenVPN > Successful ARP Flush on interface [37] {194CCD17-FB84-480A-AB50-A6E74222CE09}
. 2020.01.18 16:03:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.18 16:03:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=37 fde6:7a:7d20:1576::10be store=active
. 2020.01.18 16:03:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1576::1 validate=no
. 2020.01.18 16:03:34 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1576::/64 -> fde6:7a:7d20:1576::10be metric 0) dev Ethernet
. 2020.01.18 16:03:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1576::/64 interface=37 fe80::8 store=active
. 2020.01.18 16:03:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.189 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 16:03:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:03:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.118.1
. 2020.01.18 16:03:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:03:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.118.1
. 2020.01.18 16:03:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 16:03:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 16:03:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1576::1 metric -1) dev Ethernet
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 16:03:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1576::1 metric -1) dev Ethernet
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:03:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1576::1 metric -1) dev Ethernet
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:03:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1576::1 metric -1) dev Ethernet
. 2020.01.18 16:03:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 16:03:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:03:39 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.18 16:03:39 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.18 16:03:39 - DNS leak protection with packet filtering enabled.
. 2020.01.18 16:03:40 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.25.118.1)
. 2020.01.18 16:03:40 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1576::1)
. 2020.01.18 16:03:40 - Routes, added a new route, 141.98.102.187 for gateway 10.25.118.1
. 2020.01.18 16:03:40 - Routes, added a new route, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:1576::1
. 2020.01.18 16:03:40 - Flushing DNS
I 2020.01.18 16:03:43 - Checking route IPv4
. 2020.01.18 16:04:03 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.18 16:04:03 - Checking route (2° try)
. 2020.01.18 16:04:24 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2020.01.18 16:04:24 - Checking route (3° try)
. 2020.01.18 16:04:39 - OpenVPN > Initialization Sequence Completed
! 2020.01.18 16:04:39 - Disconnecting
. 2020.01.18 16:04:39 - Routes, removed a route previously added, 141.98.102.187 for gateway 10.25.118.1
. 2020.01.18 16:04:39 - Routes, removed a route previously added, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:1576::1
. 2020.01.18 16:04:39 - Sending management termination signal
. 2020.01.18 16:04:39 - Management - Send 'signal SIGTERM'
. 2020.01.18 16:04:39 - OpenVPN > MANAGEMENT: CMD '49b2e929cd951e1070dedd09d86057f5e0d37b8eb23fa4de1b04067f60b54744'
. 2020.01.18 16:04:48 - Sending management termination signal
. 2020.01.18 16:04:48 - Management - Send 'signal SIGTERM'
. 2020.01.18 16:04:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.18 16:04:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 141.98.102.189 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 16:04:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.118.1
. 2020.01.18 16:04:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.118.1
. 2020.01.18 16:04:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.18 16:04:53 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 16:04:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:04:53 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:04:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:04:53 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 16:04:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:04:53 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 16:04:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 16:04:53 - OpenVPN > Closing TUN/TAP interface
. 2020.01.18 16:04:53 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1576::/64)
. 2020.01.18 16:04:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1576::/64 interface=37 fe80::8 store=active
. 2020.01.18 16:04:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet fde6:7a:7d20:1576::10be store=active
. 2020.01.18 16:04:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet all
. 2020.01.18 16:04:54 - OpenVPN > TAP: DHCP address released
. 2020.01.18 16:04:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.01.18 16:04:54 - Connection terminated.
. 2020.01.18 16:04:54 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:04:54 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic)
. 2020.01.18 16:04:54 - DNS leak protection with packet filtering disabled.
. 2020.01.18 16:04:54 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2020.01.18 16:04:54 - Interface Ethernet metric restored from 3 to Automatic, layer IPv6
. 2020.01.18 16:04:54 - Flushing DNS
! 2020.01.18 16:04:58 - Session terminated.
. 2020.01.18 16:12:54 - Updating systems & servers data ...
. 2020.01.18 16:12:56 - Systems & servers data update completed
. 2020.01.18 16:23:42 - Updating systems & servers data ...
. 2020.01.18 16:23:43 - Systems & servers data update completed
. 2020.01.18 16:34:26 - Updating systems & servers data ...
. 2020.01.18 16:34:27 - Systems & servers data update completed
. 2020.01.18 16:45:06 - Updating systems & servers data ...
. 2020.01.18 16:45:07 - Systems & servers data update completed
. 2020.01.18 16:55:14 - Updating systems & servers data ...
. 2020.01.18 16:55:15 - Systems & servers data update completed
I 2020.01.18 17:01:29 - Session starting.
I 2020.01.18 17:01:30 - Checking authorization ...
! 2020.01.18 17:01:30 - Connecting to Menkalinan (Germany, Frankfurt)
. 2020.01.18 17:01:30 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.01.18 17:01:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.18 17:01:30 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.01.18 17:01:30 - Connection to OpenVPN Management Interface
. 2020.01.18 17:01:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.18 17:01:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 17:01:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 17:01:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.01.18 17:01:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.01.18 17:01:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.229:443
. 2020.01.18 17:01:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.18 17:01:30 - OpenVPN > UDP link local: (not bound)
. 2020.01.18 17:01:30 - OpenVPN > UDP link remote: [AF_INET]141.98.102.229:443
. 2020.01.18 17:01:30 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.229:443, sid=9d7cefd1 3e5119de
. 2020.01.18 17:01:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.18 17:01:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.18 17:01:32 - OpenVPN > VERIFY KU OK
. 2020.01.18 17:01:32 - OpenVPN > Validating certificate extended key usage
. 2020.01.18 17:01:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.18 17:01:32 - OpenVPN > VERIFY EKU OK
. 2020.01.18 17:01:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkalinan, emailAddress=info@airvpn.org
. 2020.01.18 17:01:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.18 17:01:40 - OpenVPN > [Menkalinan] Peer Connection Initiated with [AF_INET]141.98.102.229:443
. 2020.01.18 17:01:42 - OpenVPN > SENT CONTROL [Menkalinan]: 'PUSH_REQUEST' (status=1)
. 2020.01.18 17:01:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.22.1,dhcp-option DNS6 fde6:7a:7d20:1716::1,tun-ipv6,route-gateway 10.27.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1716::1064/64 fde6:7a:7d20:1716::1,ifconfig 10.27.22.102 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2020.01.18 17:01:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.18 17:01:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.18 17:01:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.18 17:01:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 17:01:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.18 17:01:43 - OpenVPN > interactive service msg_channel=0
. 2020.01.18 17:01:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=41 HWADDR=00:e0:4c:68:96:e6
. 2020.01.18 17:01:43 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.01.18 17:01:43 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�.   (code=1168)
. 2020.01.18 17:01:43 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.01.18 17:01:43 - OpenVPN > open_tun
. 2020.01.18 17:01:43 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{194CCD17-FB84-480A-AB50-A6E74222CE09}.tap
. 2020.01.18 17:01:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.18 17:01:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.22.0/10.27.22.102/255.255.255.0 [SUCCEEDED]
. 2020.01.18 17:01:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.22.102/255.255.255.0 on interface {194CCD17-FB84-480A-AB50-A6E74222CE09} [DHCP-serv: 10.27.22.254, lease-time: 31536000]
. 2020.01.18 17:01:43 - OpenVPN > Successful ARP Flush on interface [37] {194CCD17-FB84-480A-AB50-A6E74222CE09}
. 2020.01.18 17:01:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.01.18 17:01:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=37 fde6:7a:7d20:1716::1064 store=active
. 2020.01.18 17:01:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet static fde6:7a:7d20:1716::1 validate=no
. 2020.01.18 17:01:45 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.01.18 17:01:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1716::/64 -> fde6:7a:7d20:1716::1064 metric 0) dev Ethernet
. 2020.01.18 17:01:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1716::/64 interface=37 fe80::8 store=active
. 2020.01.18 17:01:45 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 17:01:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 141.98.102.229 MASK 255.255.255.255 192.168.1.1
. 2020.01.18 17:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 17:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.18 17:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 17:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.22.1
. 2020.01.18 17:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.18 17:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.18 17:01:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=37 fe80::8 store=active
. 2020.01.18 17:01:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 17:01:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=37 fe80::8 store=active
. 2020.01.18 17:01:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 17:01:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=37 fe80::8 store=active
. 2020.01.18 17:01:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 17:01:50 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1716::1 metric -1) dev Ethernet
. 2020.01.18 17:01:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=37 fe80::8 store=active
. 2020.01.18 17:01:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.18 17:01:50 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2020.01.18 17:01:50 - Interface Ethernet metric changed from Automatic to 3, layer IPv6
. 2020.01.18 17:01:50 - DNS leak protection with packet filtering enabled.
. 2020.01.18 17:01:51 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.27.22.1)
. 2020.01.18 17:01:51 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1716::1)
. 2020.01.18 17:01:51 - Routes, added a new route, 141.98.102.227 for gateway 10.27.22.1
. 2020.01.18 17:01:51 - Routes, added a new route, 2001:ac8:20:98:1ca5:ffb5:b4c:1214 for gateway fde6:7a:7d20:1716::1
. 2020.01.18 17:01:51 - Flushing DNS
I 2020.01.18 17:01:54 - Checking route IPv4
I 2020.01.18 17:02:12 - Checking route IPv6
I 2020.01.18 17:02:28 - Checking DNS
! 2020.01.18 17:02:36 - Connected.
. 2020.01.18 17:02:36 - OpenVPN > Initialization Sequence Completed
. 2020.01.18 17:06:14 - Updating systems & servers data ...
. 2020.01.18 17:07:35 - Cannot retrieve systems & servers data. (curl: (28) Operation timed out after 20000 milliseconds with 3278 out of 137504 bytes received)


 

Edited ... by giganerd
Apply LOG formatting to logs

Share this post


Link to post

Problem no longer present without any changes other than the ones stated above. Weird, cannot really say what went wrong first and right on its own.

Share this post


Link to post
5 hours ago, techterrain said:

Problem no longer present without any changes other than the ones stated above. Weird, cannot really say what went wrong first and right on its own.


Can you maybe post another support file here, please? I'm curious which details changed, if any.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...