sandytooth 0 Posted ... Heya, it just won't work. Tried rebooting router, computer etc but nothing works. Not really sure what else to do. Lifebelt Log: AirVPN Support Report - Generated 29/05/2020 22:29 UTC -- Environment -- Eddie version: 2.12.4 Eddie OS build: windows_x64 OS type: Windows OS name: Microsoft Windows NT 10.0.18362.0 OS description: Microsoft Windows NT 10.0.18362.0 Mono /.Net Framework: v4.0.30319 OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2 OpenVPN: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe) SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.34.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\grrrb\AppData\Local\AirVPN\AirVPN.xml Data path: C:\Users\grrrb\AppData\Local\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\AirVPN.exe Command line arguments (1): path="home" -- Important options not at defaults -- login: sandytooth password: (omissis) remember: True connect: True servers.blacklist: d8ea2860327c51d8da0b4f4c2be351314cb68a61aaf0ee1019c787517e3f9c8f,c9faaf87eacb69850882d01708368a30601bad56a487cfcdc9654622112be54a gui.windows.start_minimized: True gui.windows.tray: False -- Logs -- . 2020.05.29 23:20:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:20:40 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:20:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kocab, emailAddress=info@airvpn.org . 2020.05.29 23:20:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:20:40 - OpenVPN > [Kocab] Peer Connection Initiated with [AF_INET]213.152.162.180:443 . 2020.05.29 23:20:42 - OpenVPN > SENT CONTROL [Kocab]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:20:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.104.1,route-gateway 10.20.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.104.97 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:20:42 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:20:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:20:42 - OpenVPN > open_tun . 2020.05.29 23:20:42 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:20:42 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:20:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.104.0/10.20.104.97/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:20:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.104.97/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.20.104.254, lease-time: 31536000] . 2020.05.29 23:20:42 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:20:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:20:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.180 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - Starting Management Interface . 2020.05.29 23:20:47 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:20:47 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:20:47 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.12.232.1) to 10.20.104.1) . 2020.05.29 23:20:47 - Flushing DNS I 2020.05.29 23:20:51 - Checking route E 2020.05.29 23:20:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:20:52 - Checking route (2° try) E 2020.05.29 23:20:53 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:20:53 - Checking route (3° try) E 2020.05.29 23:20:56 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:20:56 - Routing checking failed. . 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:20:56 - Disconnecting . 2020.05.29 23:20:56 - Management - Send 'signal SIGTERM' . 2020.05.29 23:20:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:20:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:01 - Connection terminated. . 2020.05.29 23:21:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.12.232.1) . 2020.05.29 23:21:01 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:04 - Checking authorization ... ! 2020.05.29 23:21:05 - Connecting to Crater (Netherlands, Alblasserdam) . 2020.05.29 23:21:05 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:05 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:05 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:05 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=86b01962 5bbf0290 . 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:05 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:05 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:05 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:05 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org . 2020.05.29 23:21:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:05 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:07 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.14.168.1,route-gateway 10.14.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.168.232 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:07 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:07 - OpenVPN > open_tun . 2020.05.29 23:21:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:07 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.168.0/10.14.168.232/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.168.232/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.168.254, lease-time: 31536000] . 2020.05.29 23:21:07 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:21:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.14 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - Starting Management Interface . 2020.05.29 23:21:12 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:21:12 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:21:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.20.104.1) to 10.14.168.1) . 2020.05.29 23:21:12 - Flushing DNS I 2020.05.29 23:21:16 - Checking route E 2020.05.29 23:21:16 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:16 - Checking route (2° try) E 2020.05.29 23:21:18 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:18 - Checking route (3° try) E 2020.05.29 23:21:20 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:21:20 - Routing checking failed. . 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:21:20 - Disconnecting . 2020.05.29 23:21:20 - Management - Send 'signal SIGTERM' . 2020.05.29 23:21:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:21:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.14 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:25 - Connection terminated. . 2020.05.29 23:21:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.20.104.1) . 2020.05.29 23:21:25 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:28 - Checking authorization ... ! 2020.05.29 23:21:29 - Connecting to Norma (Sweden, Stockholm) . 2020.05.29 23:21:29 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:29 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:29 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:29 - OpenVPN > UDP link remote: [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:29 - OpenVPN > TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=8df01cbf c76a3173 . 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:29 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:29 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:29 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:29 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org . 2020.05.29 23:21:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:29 - OpenVPN > [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:30 - OpenVPN > SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.25.72.152 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:31 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:31 - OpenVPN > open_tun . 2020.05.29 23:21:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:31 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.72.0/10.25.72.152/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.72.152/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.25.72.254, lease-time: 31536000] . 2020.05.29 23:21:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:21:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 31.3.152.99 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - Starting Management Interface . 2020.05.29 23:21:36 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:21:36 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:21:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.168.1) to 10.25.72.1) . 2020.05.29 23:21:36 - Flushing DNS I 2020.05.29 23:21:40 - Checking route E 2020.05.29 23:21:40 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:40 - Checking route (2° try) E 2020.05.29 23:21:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:42 - Checking route (3° try) E 2020.05.29 23:21:44 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:21:44 - Routing checking failed. . 2020.05.29 23:21:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:21:45 - Disconnecting . 2020.05.29 23:21:45 - Management - Send 'signal SIGTERM' . 2020.05.29 23:21:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:21:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:21:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 31.3.152.99 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:50 - Connection terminated. . 2020.05.29 23:21:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.168.1) . 2020.05.29 23:21:50 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:53 - Checking authorization ... ! 2020.05.29 23:21:54 - Connecting to Asellus (Netherlands, Alblasserdam) . 2020.05.29 23:21:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:54 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:55 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:55 - OpenVPN > UDP link remote: [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=10450bd8 07610100 . 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:55 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:55 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:55 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:55 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org . 2020.05.29 23:21:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:55 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:56 - OpenVPN > SENT CONTROL [Asellus]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.10.8.1,route-gateway 10.10.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.10.8.120 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:56 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:56 - OpenVPN > open_tun . 2020.05.29 23:21:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.10.8.0/10.10.8.120/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.8.120/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.10.8.254, lease-time: 31536000] . 2020.05.29 23:21:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - Starting Management Interface . 2020.05.29 23:22:01 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:01 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.25.72.1) to 10.10.8.1) . 2020.05.29 23:22:01 - Flushing DNS I 2020.05.29 23:22:06 - Checking route E 2020.05.29 23:22:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:07 - Checking route (2° try) E 2020.05.29 23:22:08 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:08 - Checking route (3° try) E 2020.05.29 23:22:11 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:22:11 - Routing checking failed. . 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:22:11 - Disconnecting . 2020.05.29 23:22:11 - Management - Send 'signal SIGTERM' . 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:22:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:22:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:22:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:22:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:22:16 - Connection terminated. . 2020.05.29 23:22:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.25.72.1) . 2020.05.29 23:22:16 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:22:19 - Checking authorization ... ! 2020.05.29 23:22:20 - Connecting to Larawag (Netherlands, Alblasserdam) . 2020.05.29 23:22:20 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:22:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:22:20 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:22:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:22:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:22:20 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:22:20 - OpenVPN > UDP link remote: [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:20 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.178:443, sid=536472f0 61544dba . 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:22:21 - OpenVPN > Validating certificate key usage . 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:22:21 - OpenVPN > VERIFY KU OK . 2020.05.29 23:22:21 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:22:21 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Larawag, emailAddress=info@airvpn.org . 2020.05.29 23:22:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:22:21 - OpenVPN > [Larawag] Peer Connection Initiated with [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:22 - OpenVPN > SENT CONTROL [Larawag]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:22:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.33.232.1,route-gateway 10.33.232.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.232.79 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:22:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:22 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:22:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:22:22 - OpenVPN > open_tun . 2020.05.29 23:22:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:22:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:22:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.232.0/10.33.232.79/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:22:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.232.79/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.232.254, lease-time: 31536000] . 2020.05.29 23:22:23 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:22:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.178 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - Starting Management Interface . 2020.05.29 23:22:27 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:27 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:27 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.10.8.1) to 10.33.232.1) . 2020.05.29 23:22:28 - Flushing DNS I 2020.05.29 23:22:32 - Checking route E 2020.05.29 23:22:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:32 - Checking route (2° try) E 2020.05.29 23:22:34 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:34 - Checking route (3° try) E 2020.05.29 23:22:36 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:22:36 - Routing checking failed. . 2020.05.29 23:22:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:22:37 - Disconnecting . 2020.05.29 23:22:37 - Management - Send 'signal SIGTERM' . 2020.05.29 23:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:22:37 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.178 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:22:42 - Connection terminated. . 2020.05.29 23:22:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.10.8.1) . 2020.05.29 23:22:42 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:22:45 - Checking authorization ... ! 2020.05.29 23:22:46 - Connecting to Chara (Netherlands, Alblasserdam) . 2020.05.29 23:22:46 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:22:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:22:46 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:22:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:22:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:22:46 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:22:46 - OpenVPN > UDP link remote: [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:46 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=877f1d99 0b1717b0 . 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:22:46 - OpenVPN > Validating certificate key usage . 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:22:46 - OpenVPN > VERIFY KU OK . 2020.05.29 23:22:46 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:22:46 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chara, emailAddress=info@airvpn.org . 2020.05.29 23:22:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:22:47 - OpenVPN > [Chara] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:48 - OpenVPN > SENT CONTROL [Chara]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.14.8.1,route-gateway 10.14.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.8.157 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:22:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:48 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:22:48 - OpenVPN > open_tun . 2020.05.29 23:22:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:22:48 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.8.0/10.14.8.157/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.8.157/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.8.254, lease-time: 31536000] . 2020.05.29 23:22:48 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:22:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - Starting Management Interface . 2020.05.29 23:22:53 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:53 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.232.1) to 10.14.8.1) . 2020.05.29 23:22:53 - Flushing DNS I 2020.05.29 23:22:57 - Checking route E 2020.05.29 23:22:58 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:58 - Checking route (2° try) E 2020.05.29 23:22:59 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:59 - Checking route (3° try) E 2020.05.29 23:23:02 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:02 - Routing checking failed. . 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:02 - Disconnecting . 2020.05.29 23:23:02 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:02 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:07 - Connection terminated. . 2020.05.29 23:23:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.232.1) . 2020.05.29 23:23:07 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:23:10 - Checking authorization ... ! 2020.05.29 23:23:11 - Connecting to Alphard (Netherlands, Alblasserdam) . 2020.05.29 23:23:11 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:23:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:23:11 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:23:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:23:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:23:11 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:23:11 - OpenVPN > UDP link remote: [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:11 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=8070cd2d bd316afa . 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:23:12 - OpenVPN > Validating certificate key usage . 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:23:12 - OpenVPN > VERIFY KU OK . 2020.05.29 23:23:12 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:23:12 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphard, emailAddress=info@airvpn.org . 2020.05.29 23:23:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:23:12 - OpenVPN > [Alphard] Peer Connection Initiated with [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:13 - OpenVPN > SENT CONTROL [Alphard]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:23:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.7.40.1,route-gateway 10.7.40.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.40.178 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:23:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:13 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:23:13 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:23:13 - OpenVPN > open_tun . 2020.05.29 23:23:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:23:13 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:23:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.40.0/10.7.40.178/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:23:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.40.178/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.40.254, lease-time: 31536000] . 2020.05.29 23:23:13 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:23:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:23:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - Starting Management Interface . 2020.05.29 23:23:18 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:23:18 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:23:18 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.8.1) to 10.7.40.1) . 2020.05.29 23:23:19 - Flushing DNS I 2020.05.29 23:23:23 - Checking route E 2020.05.29 23:23:23 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:23 - Checking route (2° try) E 2020.05.29 23:23:25 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:25 - Checking route (3° try) E 2020.05.29 23:23:27 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:27 - Routing checking failed. . 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:27 - Disconnecting . 2020.05.29 23:23:27 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:27 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.9 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:32 - Connection terminated. . 2020.05.29 23:23:32 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.8.1) . 2020.05.29 23:23:32 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:23:35 - Checking authorization ... ! 2020.05.29 23:23:36 - Connecting to Jabbah (Netherlands, Alblasserdam) . 2020.05.29 23:23:36 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:23:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:23:36 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:23:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:23:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:23:36 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:23:36 - OpenVPN > UDP link remote: [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:36 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.108:443, sid=7d32a323 d6ec22b0 . 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:23:36 - OpenVPN > Validating certificate key usage . 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:23:36 - OpenVPN > VERIFY KU OK . 2020.05.29 23:23:36 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:23:36 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Jabbah, emailAddress=info@airvpn.org . 2020.05.29 23:23:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:23:36 - OpenVPN > [Jabbah] Peer Connection Initiated with [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:37 - OpenVPN > SENT CONTROL [Jabbah]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:23:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.19.200.1,route-gateway 10.19.200.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.19.200.138 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:23:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:37 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:23:37 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:23:37 - OpenVPN > open_tun . 2020.05.29 23:23:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:23:38 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:23:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.200.0/10.19.200.138/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:23:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.200.138/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.19.200.254, lease-time: 31536000] . 2020.05.29 23:23:38 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:23:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:23:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - Starting Management Interface . 2020.05.29 23:23:43 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:23:43 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:23:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.40.1) to 10.19.200.1) . 2020.05.29 23:23:43 - Flushing DNS I 2020.05.29 23:23:47 - Checking route E 2020.05.29 23:23:48 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:48 - Checking route (2° try) E 2020.05.29 23:23:49 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:49 - Checking route (3° try) E 2020.05.29 23:23:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:52 - Routing checking failed. . 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:52 - Disconnecting . 2020.05.29 23:23:52 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:52 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:57 - Connection terminated. . 2020.05.29 23:23:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.40.1) . 2020.05.29 23:23:57 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:00 - Checking authorization ... ! 2020.05.29 23:24:01 - Connecting to Capella (Netherlands, Alblasserdam) . 2020.05.29 23:24:01 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:01 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:01 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:01 - OpenVPN > UDP link remote: [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:01 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.138:443, sid=f9a8ab1f d5a5c516 . 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:01 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:01 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:01 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:01 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capella, emailAddress=info@airvpn.org . 2020.05.29 23:24:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:02 - OpenVPN > [Capella] Peer Connection Initiated with [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:03 - OpenVPN > SENT CONTROL [Capella]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.33.168.1,route-gateway 10.33.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.168.173 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:03 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:03 - OpenVPN > open_tun . 2020.05.29 23:24:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:03 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.168.0/10.33.168.173/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.168.173/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.168.254, lease-time: 31536000] . 2020.05.29 23:24:03 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:24:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.138 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - Starting Management Interface . 2020.05.29 23:24:08 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:24:08 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:24:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.200.1) to 10.33.168.1) . 2020.05.29 23:24:08 - Flushing DNS I 2020.05.29 23:24:12 - Checking route E 2020.05.29 23:24:13 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:13 - Checking route (2° try) E 2020.05.29 23:24:15 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:15 - Checking route (3° try) E 2020.05.29 23:24:17 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:24:17 - Routing checking failed. . 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:24:17 - Disconnecting . 2020.05.29 23:24:17 - Management - Send 'signal SIGTERM' . 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:24:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.138 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:24:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:24:22 - Connection terminated. . 2020.05.29 23:24:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.200.1) . 2020.05.29 23:24:22 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:25 - Checking authorization ... ! 2020.05.29 23:24:26 - Connecting to Alphirk (Netherlands, Alblasserdam) . 2020.05.29 23:24:26 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:26 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:26 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:26 - OpenVPN > UDP link remote: [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:26 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.146:443, sid=af04fa78 1692de97 . 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:26 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:26 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:26 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:26 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2020.05.29 23:24:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:26 - OpenVPN > [Alphirk] Peer Connection Initiated with [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:28 - OpenVPN > SENT CONTROL [Alphirk]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.7.104.1,route-gateway 10.7.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.104.185 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:30 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:30 - OpenVPN > open_tun . 2020.05.29 23:24:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:31 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.104.0/10.7.104.185/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.104.185/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.104.254, lease-time: 31536000] . 2020.05.29 23:24:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:24:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.146 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - Starting Management Interface . 2020.05.29 23:24:36 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:24:36 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.168.1) to 10.7.104.1) . 2020.05.29 23:24:36 - Flushing DNS I 2020.05.29 23:24:40 - Checking route E 2020.05.29 23:24:41 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:41 - Checking route (2° try) E 2020.05.29 23:24:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:42 - Checking route (3° try) E 2020.05.29 23:24:45 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:24:45 - Routing checking failed. . 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:24:45 - Disconnecting . 2020.05.29 23:24:45 - Management - Send 'signal SIGTERM' . 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:24:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:24:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:24:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.146 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:24:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:24:50 - Connection terminated. . 2020.05.29 23:24:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.168.1) . 2020.05.29 23:24:50 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:53 - Checking authorization ... ! 2020.05.29 23:24:54 - Connecting to Musica (Netherlands, Alblasserdam) . 2020.05.29 23:24:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:54 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:54 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:54 - OpenVPN > UDP link remote: [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.248:443, sid=e28198b6 5e8347e3 . 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:54 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:54 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:54 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:54 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org . 2020.05.29 23:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:54 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:56 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.24.168.1,route-gateway 10.24.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.168.137 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:56 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:56 - OpenVPN > open_tun . 2020.05.29 23:24:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.168.0/10.24.168.137/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.168.137/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.24.168.254, lease-time: 31536000] . 2020.05.29 23:24:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:25:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.248 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - Starting Management Interface . 2020.05.29 23:25:01 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:25:01 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:25:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.104.1) to 10.24.168.1) . 2020.05.29 23:25:01 - Flushing DNS I 2020.05.29 23:25:05 - Checking route E 2020.05.29 23:25:06 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:06 - Checking route (2° try) E 2020.05.29 23:25:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:07 - Checking route (3° try) E 2020.05.29 23:25:10 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:25:10 - Routing checking failed. . 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:25:10 - Disconnecting . 2020.05.29 23:25:10 - Management - Send 'signal SIGTERM' . 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:25:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:25:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.248 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:25:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:25:15 - Connection terminated. . 2020.05.29 23:25:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.104.1) . 2020.05.29 23:25:15 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:25:18 - Checking authorization ... ! 2020.05.29 23:25:19 - Connecting to Talitha (Netherlands, Alblasserdam) . 2020.05.29 23:25:19 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:25:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:25:19 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:25:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:25:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:25:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:25:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:25:19 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:25:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=78e71c1c f58fe524 . 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:25:19 - OpenVPN > Validating certificate key usage . 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:25:19 - OpenVPN > VERIFY KU OK . 2020.05.29 23:25:19 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:25:19 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.05.29 23:25:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:25:19 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:20 - OpenVPN > SENT CONTROL [Talitha]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:25:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.31.8.1,route-gateway 10.31.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.8.86 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:25:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:25:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:25:20 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:25:20 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:25:21 - OpenVPN > open_tun . 2020.05.29 23:25:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:25:21 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:25:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.8.0/10.31.8.86/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:25:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.8.86/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.31.8.254, lease-time: 31536000] . 2020.05.29 23:25:21 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:25:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:25:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - Starting Management Interface . 2020.05.29 23:25:26 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:25:26 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:25:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.24.168.1) to 10.31.8.1) . 2020.05.29 23:25:26 - Flushing DNS I 2020.05.29 23:25:30 - Checking route E 2020.05.29 23:25:30 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:30 - Checking route (2° try) E 2020.05.29 23:25:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:32 - Checking route (3° try) ! 2020.05.29 23:25:34 - Disconnecting . 2020.05.29 23:25:34 - Management - Send 'signal SIGTERM' . 2020.05.29 23:25:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:25:39 - Connection terminated. . 2020.05.29 23:25:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.24.168.1) . 2020.05.29 23:25:39 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:25:39 - Cancel requested. . 2020.05.29 23:25:39 - IPv6 restored with packet filtering. . 2020.05.29 23:25:39 - Flushing DNS ! 2020.05.29 23:25:43 - Session terminated. E 2020.05.29 23:25:44 - curl: (28) Connection timed out after 10047 milliseconds . 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:25:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:29:14 - Updating systems & servers data ... . 2020.05.29 23:29:15 - Systems & servers data update completed -- System -- Operating System: Microsoft Windows NT 10.0.18362.0 Network Interface: Ethernet (Realtek PCIe GbE Family Controller, ID:{198A4B88-7AC3-4DA2-A5C1-795D8721E02F}) - Ethernet - Down Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{F6255F87-D147-4715-8733-049D327C9F4B}) - Wireless80211 - Down Network Interface: Local Area Connection* 11 (Microsoft Wi-Fi Direct Virtual Adapter #2, ID:{E9667F7F-5B0B-4621-8B26-A407F18A2A9A}) - Wireless80211 - Down Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}) - Ethernet - Down Network Interface: WiFi (Qualcomm Atheros AR938x Wireless Network Adapter, ID:{4134EE65-8265-43FD-974E-8D81DCF65BAF}) - Wireless80211 - Up Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{F5EF2E9E-DB15-11E7-81B0-806E6F6E6963}) - Loopback - Up Routing: Address: 0.0.0.0, Mask: 0.0.0.0, Gateway: 192.168.0.1, Interface: 8, Metrics: 40, Flags: , Mss: , Window: , Irtt: Address: 169.254.0.0, Mask: 255.255.0.0, Gateway: 192.168.0.50, Interface: 8, Metrics: 41, Flags: , Mss: , Window: , Irtt: Default gateways: 192.168.0.1, Qualcomm Atheros AR938x Wireless Network Adapter -- Windows -- ipconfig /all Windows IP Configuration Host Name . . . . . . . . . . . . : HOME8 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 94-DE-80-78-BC-66 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 12-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 22-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-72-6F-12-3E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter WiFi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Qualcomm Atheros AR938x Wireless Network Adapter Physical Address. . . . . . . . . : A0-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::ec64:e7c9:828c:6b6f%8(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.4(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : 29 May 2020 15:16:37 Lease Expires . . . . . . . . . . : 30 May 2020 15:16:37 Default Gateway . . . . . . . . . : 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 111211457 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-37-78-12-94-DE-80-78-BC-66 DNS Servers . . . . . . . . . . . : 192.168.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled -- NetworkAdapterConfiguration Network Adapter: [00000000] Microsoft Kernel Debug Network Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000000] Microsoft Kernel Debug Network Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Kernel Debug Network Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 0 InterfaceIndex: 11 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: kdnic SettingID: {7CBE7845-FCCA-430B-9043-466612618A25} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000001] TAP-Windows Adapter V9 DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000001] TAP-Windows Adapter V9 DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: TAP-Windows Adapter V9 DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 1 InterfaceIndex: 10 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 00:FF:72:6F:12:3E MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: tap0901 SettingID: {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter DNS: 192.168.0.1 Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter DatabasePath: %SystemRoot%\System32\drivers\etc DeadGWDetectEnabled: null DefaultIPGateway: 192.168.0.1 DefaultTOS: null DefaultTTL: null Description: Qualcomm Atheros AR938x Wireless Network Adapter DHCPEnabled: true DHCPLeaseExpires: 20200530151637.000000+060 DHCPLeaseObtained: 20200529151637.000000+060 DHCPServer: 192.168.0.1 DNSDomain: null DNSDomainSuffixSearchOrder: DNSEnabledForWINSResolution: false DNSHostName: HOME8 DNSServerSearchOrder: 192.168.0.1 DomainDNSRegistrationEnabled: false ForwardBufferMemory: null FullDNSRegistrationEnabled: true GatewayCostMetric: System.UInt16[] IGMPLevel: null Index: 2 InterfaceIndex: 8 IPAddress: 192.168.0.4,fe80::ec64:e7c9:828c:6b6f IPConnectionMetric: 40 IPEnabled: true IPFilterSecurityEnabled: false IPPortSecurityEnabled: null IPSecPermitIPProtocols: IPSecPermitTCPPorts: IPSecPermitUDPPorts: IPSubnet: 255.255.255.0,64 IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: A0:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: athr SettingID: {4134EE65-8265-43FD-974E-8D81DCF65BAF} TcpipNetbiosOptions: 0 TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: true WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: WINSSecondaryServer: null Network Adapter: [00000003] Realtek PCIe GbE Family Controller DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000003] Realtek PCIe GbE Family Controller DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Realtek PCIe GbE Family Controller DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 3 InterfaceIndex: 5 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 94:DE:80:78:BC:66 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: rt640x64 SettingID: {198A4B88-7AC3-4DA2-A5C1-795D8721E02F} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000004] Microsoft Wi-Fi Direct Virtual Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000004] Microsoft Wi-Fi Direct Virtual Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Wi-Fi Direct Virtual Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 4 InterfaceIndex: 22 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 12:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: vwifimp SettingID: {F6255F87-D147-4715-8733-049D327C9F4B} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000005] WAN Miniport (SSTP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000005] WAN Miniport (SSTP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (SSTP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 5 InterfaceIndex: 4 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasSstp SettingID: {14F63973-417D-430A-913A-8FDF5B6395CF} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000006] WAN Miniport (IKEv2) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000006] WAN Miniport (IKEv2) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IKEv2) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 6 InterfaceIndex: 6 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasAgileVpn SettingID: {2300350F-D959-4B5B-B4C5-9AA99B34C746} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000007] WAN Miniport (L2TP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000007] WAN Miniport (L2TP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (L2TP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 7 InterfaceIndex: 13 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: Rasl2tp SettingID: {9D8B3855-0B7D-4060-AA05-D6929934CE73} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000008] WAN Miniport (PPTP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000008] WAN Miniport (PPTP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (PPTP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 8 InterfaceIndex: 19 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: PptpMiniport SettingID: {CF0B200C-11BD-4FBE-82B3-CE7C4AAED1E8} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000009] WAN Miniport (PPPOE) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000009] WAN Miniport (PPPOE) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (PPPOE) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 9 InterfaceIndex: 16 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasPppoe SettingID: {C05E5A13-D325-4A71-9B0D-E5603725C6E1} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000010] WAN Miniport (IP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000010] WAN Miniport (IP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 10 InterfaceIndex: 17 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 28:F2:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {C3B10829-0AB9-45B3-82DF-BA08165DA79F} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000011] WAN Miniport (IPv6) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000011] WAN Miniport (IPv6) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IPv6) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 11 InterfaceIndex: 18 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 28:E7:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {C8472531-96BD-4975-904C-6C5C216BF348} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000012] WAN Miniport (Network Monitor) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000012] WAN Miniport (Network Monitor) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (Network Monitor) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 12 InterfaceIndex: 15 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 2A:7D:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {A5329D43-8399-4F6E-B937-1ADE604C3D02} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000013] Microsoft Wi-Fi Direct Virtual Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000013] Microsoft Wi-Fi Direct Virtual Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Wi-Fi Direct Virtual Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 13 InterfaceIndex: 21 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 22:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: vwifimp SettingID: {E9667F7F-5B0B-4621-8B26-A407F18A2A9A} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000014] RAS Async Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000014] RAS Async Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: RAS Async Adapter DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 14 InterfaceIndex: 45 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: AsyncMac SettingID: {00770D0D-DD7E-43DA-9DF8-29D74507141C} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Realtek 8812BU Wireless LAN 802.11ac USB NIC DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 15 InterfaceIndex: 9 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RtlWlanu SettingID: {6D602A89-D067-4467-BF7C-24A8543E929D} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Share this post Link to post
Staff 10014 Posted ... Hello! Eddie 2.12.4 is more than three years old and is not fully compatible with Windows 10. Please upgrade to Eddie 2.18.9 (latest stable release) and the problem should be resolved. Remove completely Eddie 2.12.4 before upgrading, in particular make sure to delete any file in directory C:\Users\grrrb\AppData\Local\AirVPN Eddie Windows edition can be downloaded here:https://airvpn.org/windows Kind regards Share this post Link to post
sandytooth 0 Posted ... Thanks! That worked, I should have thought of it earlier. Share this post Link to post