Jump to content
Not connected, Your IP: 3.237.66.86
sandytooth

ANSWERED Never connects, just keeps attempting

Recommended Posts

Heya, it just won't work.  Tried rebooting router, computer etc but nothing works.  Not really sure what else to do.

Lifebelt Log:

AirVPN Support Report - Generated 29/05/2020 22:29 UTC


-- Environment --
Eddie version: 2.12.4
Eddie OS build: windows_x64
OS type: Windows
OS name: Microsoft Windows NT 10.0.18362.0
OS description: Microsoft Windows NT 10.0.18362.0
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.0 - OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.34.0 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\grrrb\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\grrrb\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments (1): path="home"


-- Important options not at defaults --
login: sandytooth
password: (omissis)
remember: True
connect: True
servers.blacklist: d8ea2860327c51d8da0b4f4c2be351314cb68a61aaf0ee1019c787517e3f9c8f,c9faaf87eacb69850882d01708368a30601bad56a487cfcdc9654622112be54a
gui.windows.start_minimized: True
gui.windows.tray: False


-- Logs --
. 2020.05.29 23:20:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:20:40 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:20:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kocab, emailAddress=info@airvpn.org
. 2020.05.29 23:20:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:20:40 - OpenVPN > [Kocab] Peer Connection Initiated with [AF_INET]213.152.162.180:443
. 2020.05.29 23:20:42 - OpenVPN > SENT CONTROL [Kocab]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:20:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.20.104.1,route-gateway 10.20.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.104.97 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:20:42 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:20:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:20:42 - OpenVPN > open_tun
. 2020.05.29 23:20:42 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:20:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:20:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.104.0/10.20.104.97/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:20:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.104.97/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.20.104.254, lease-time: 31536000]
. 2020.05.29 23:20:42 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:20:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:20:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.180 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.104.1
. 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.104.1
. 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:20:47 - Starting Management Interface
. 2020.05.29 23:20:47 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:20:47 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:20:47 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.12.232.1) to 10.20.104.1)
. 2020.05.29 23:20:47 - Flushing DNS
I 2020.05.29 23:20:51 - Checking route
E 2020.05.29 23:20:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:20:52 - Checking route (2° try)
E 2020.05.29 23:20:53 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:20:53 - Checking route (3° try)
E 2020.05.29 23:20:56 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:20:56 - Routing checking failed.
. 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:20:56 - Disconnecting
. 2020.05.29 23:20:56 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:20:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:20:56 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.104.1
. 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.104.1
. 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:01 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:21:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:21:01 - Connection terminated.
. 2020.05.29 23:21:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.12.232.1)
. 2020.05.29 23:21:01 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:21:04 - Checking authorization ...
! 2020.05.29 23:21:05 - Connecting to Crater (Netherlands, Alblasserdam)
. 2020.05.29 23:21:05 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:21:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:21:05 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:21:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:21:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443
. 2020.05.29 23:21:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:21:05 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:21:05 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443
. 2020.05.29 23:21:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=86b01962 5bbf0290
. 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:21:05 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:21:05 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:21:05 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:21:05 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org
. 2020.05.29 23:21:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:21:05 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443
. 2020.05.29 23:21:07 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:21:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.14.168.1,route-gateway 10.14.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.168.232 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:21:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:07 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:21:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:21:07 - OpenVPN > open_tun
. 2020.05.29 23:21:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:21:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:21:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.168.0/10.14.168.232/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:21:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.168.232/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.168.254, lease-time: 31536000]
. 2020.05.29 23:21:07 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:21:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:21:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.14 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.168.1
. 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.168.1
. 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:12 - Starting Management Interface
. 2020.05.29 23:21:12 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:21:12 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:21:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.20.104.1) to 10.14.168.1)
. 2020.05.29 23:21:12 - Flushing DNS
I 2020.05.29 23:21:16 - Checking route
E 2020.05.29 23:21:16 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:21:16 - Checking route (2° try)
E 2020.05.29 23:21:18 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:21:18 - Checking route (3° try)
E 2020.05.29 23:21:20 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:21:20 - Routing checking failed.
. 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:21:20 - Disconnecting
. 2020.05.29 23:21:20 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:21:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:21:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.14 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.168.1
. 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.168.1
. 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:25 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:21:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:21:25 - Connection terminated.
. 2020.05.29 23:21:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.20.104.1)
. 2020.05.29 23:21:25 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:21:28 - Checking authorization ...
! 2020.05.29 23:21:29 - Connecting to Norma (Sweden, Stockholm)
. 2020.05.29 23:21:29 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:21:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:21:29 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:21:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:21:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443
. 2020.05.29 23:21:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:21:29 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:21:29 - OpenVPN > UDP link remote: [AF_INET]31.3.152.99:443
. 2020.05.29 23:21:29 - OpenVPN > TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=8df01cbf c76a3173
. 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:21:29 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:21:29 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:21:29 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:21:29 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
. 2020.05.29 23:21:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:21:29 - OpenVPN > [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443
. 2020.05.29 23:21:30 - OpenVPN > SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:21:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.25.72.152 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:21:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:31 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:21:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:21:31 - OpenVPN > open_tun
. 2020.05.29 23:21:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:21:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:21:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.72.0/10.25.72.152/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:21:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.72.152/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.25.72.254, lease-time: 31536000]
. 2020.05.29 23:21:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:21:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:21:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 31.3.152.99 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.72.1
. 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.72.1
. 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:36 - Starting Management Interface
. 2020.05.29 23:21:36 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:21:36 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:21:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.168.1) to 10.25.72.1)
. 2020.05.29 23:21:36 - Flushing DNS
I 2020.05.29 23:21:40 - Checking route
E 2020.05.29 23:21:40 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:21:40 - Checking route (2° try)
E 2020.05.29 23:21:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:21:42 - Checking route (3° try)
E 2020.05.29 23:21:44 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:21:44 - Routing checking failed.
. 2020.05.29 23:21:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:21:45 - Disconnecting
. 2020.05.29 23:21:45 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:21:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:21:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:21:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 31.3.152.99 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.72.1
. 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.72.1
. 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:21:50 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:21:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:21:50 - Connection terminated.
. 2020.05.29 23:21:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.168.1)
. 2020.05.29 23:21:50 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:21:53 - Checking authorization ...
! 2020.05.29 23:21:54 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2020.05.29 23:21:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:21:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:21:54 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:21:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:21:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:21:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.19:443
. 2020.05.29 23:21:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:21:55 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:21:55 - OpenVPN > UDP link remote: [AF_INET]109.202.107.19:443
. 2020.05.29 23:21:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=10450bd8 07610100
. 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:21:55 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:21:55 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:21:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:21:55 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org
. 2020.05.29 23:21:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:21:55 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]109.202.107.19:443
. 2020.05.29 23:21:56 - OpenVPN > SENT CONTROL [Asellus]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:21:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.10.8.1,route-gateway 10.10.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.10.8.120 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:21:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:21:56 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:21:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:21:56 - OpenVPN > open_tun
. 2020.05.29 23:21:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:21:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:21:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.10.8.0/10.10.8.120/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:21:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.8.120/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.10.8.254, lease-time: 31536000]
. 2020.05.29 23:21:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:21:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:22:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.10.8.1
. 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.10.8.1
. 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:01 - Starting Management Interface
. 2020.05.29 23:22:01 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:22:01 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:22:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.25.72.1) to 10.10.8.1)
. 2020.05.29 23:22:01 - Flushing DNS
I 2020.05.29 23:22:06 - Checking route
E 2020.05.29 23:22:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:07 - Checking route (2° try)
E 2020.05.29 23:22:08 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:08 - Checking route (3° try)
E 2020.05.29 23:22:11 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:22:11 - Routing checking failed.
. 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:22:11 - Disconnecting
. 2020.05.29 23:22:11 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:22:11 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:22:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:22:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.10.8.1
. 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.10.8.1
. 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:16 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:22:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:22:16 - Connection terminated.
. 2020.05.29 23:22:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.25.72.1)
. 2020.05.29 23:22:16 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:22:19 - Checking authorization ...
! 2020.05.29 23:22:20 - Connecting to Larawag (Netherlands, Alblasserdam)
. 2020.05.29 23:22:20 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:22:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:22:20 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:22:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:22:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:22:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:22:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.178:443
. 2020.05.29 23:22:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:22:20 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:22:20 - OpenVPN > UDP link remote: [AF_INET]134.19.179.178:443
. 2020.05.29 23:22:20 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.178:443, sid=536472f0 61544dba
. 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:22:21 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:22:21 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:22:21 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:22:21 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Larawag, emailAddress=info@airvpn.org
. 2020.05.29 23:22:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:22:21 - OpenVPN > [Larawag] Peer Connection Initiated with [AF_INET]134.19.179.178:443
. 2020.05.29 23:22:22 - OpenVPN > SENT CONTROL [Larawag]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:22:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.33.232.1,route-gateway 10.33.232.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.232.79 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:22:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:22:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:22:22 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:22:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:22:22 - OpenVPN > open_tun
. 2020.05.29 23:22:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:22:23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:22:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.232.0/10.33.232.79/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:22:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.232.79/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.232.254, lease-time: 31536000]
. 2020.05.29 23:22:23 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:22:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:22:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.178 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.232.1
. 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.232.1
. 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:27 - Starting Management Interface
. 2020.05.29 23:22:27 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:22:27 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:22:27 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.10.8.1) to 10.33.232.1)
. 2020.05.29 23:22:28 - Flushing DNS
I 2020.05.29 23:22:32 - Checking route
E 2020.05.29 23:22:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:32 - Checking route (2° try)
E 2020.05.29 23:22:34 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:34 - Checking route (3° try)
E 2020.05.29 23:22:36 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:22:36 - Routing checking failed.
. 2020.05.29 23:22:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:22:37 - Disconnecting
. 2020.05.29 23:22:37 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:22:37 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.178 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.232.1
. 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.232.1
. 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:42 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:22:42 - Connection terminated.
. 2020.05.29 23:22:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.10.8.1)
. 2020.05.29 23:22:42 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:22:45 - Checking authorization ...
! 2020.05.29 23:22:46 - Connecting to Chara (Netherlands, Alblasserdam)
. 2020.05.29 23:22:46 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:22:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:22:46 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:22:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:22:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:22:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:22:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.232.227.132:443
. 2020.05.29 23:22:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:22:46 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:22:46 - OpenVPN > UDP link remote: [AF_INET]109.232.227.132:443
. 2020.05.29 23:22:46 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=877f1d99 0b1717b0
. 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:22:46 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:22:46 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:22:46 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:22:46 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chara, emailAddress=info@airvpn.org
. 2020.05.29 23:22:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:22:47 - OpenVPN > [Chara] Peer Connection Initiated with [AF_INET]109.232.227.132:443
. 2020.05.29 23:22:48 - OpenVPN > SENT CONTROL [Chara]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.14.8.1,route-gateway 10.14.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.8.157 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:22:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:22:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:22:48 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:22:48 - OpenVPN > open_tun
. 2020.05.29 23:22:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:22:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.8.0/10.14.8.157/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.8.157/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.8.254, lease-time: 31536000]
. 2020.05.29 23:22:48 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:22:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.8.1
. 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.8.1
. 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:22:53 - Starting Management Interface
. 2020.05.29 23:22:53 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:22:53 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:22:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.232.1) to 10.14.8.1)
. 2020.05.29 23:22:53 - Flushing DNS
I 2020.05.29 23:22:57 - Checking route
E 2020.05.29 23:22:58 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:58 - Checking route (2° try)
E 2020.05.29 23:22:59 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:22:59 - Checking route (3° try)
E 2020.05.29 23:23:02 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:23:02 - Routing checking failed.
. 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:23:02 - Disconnecting
. 2020.05.29 23:23:02 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:23:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:23:02 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.8.1
. 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.8.1
. 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:07 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:23:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:23:07 - Connection terminated.
. 2020.05.29 23:23:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.232.1)
. 2020.05.29 23:23:07 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:23:10 - Checking authorization ...
! 2020.05.29 23:23:11 - Connecting to Alphard (Netherlands, Alblasserdam)
. 2020.05.29 23:23:11 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:23:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:23:11 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:23:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:23:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:23:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:23:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.9:443
. 2020.05.29 23:23:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:23:11 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:23:11 - OpenVPN > UDP link remote: [AF_INET]109.202.107.9:443
. 2020.05.29 23:23:11 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=8070cd2d bd316afa
. 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:23:12 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:23:12 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:23:12 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:23:12 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphard, emailAddress=info@airvpn.org
. 2020.05.29 23:23:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:23:12 - OpenVPN > [Alphard] Peer Connection Initiated with [AF_INET]109.202.107.9:443
. 2020.05.29 23:23:13 - OpenVPN > SENT CONTROL [Alphard]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:23:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.7.40.1,route-gateway 10.7.40.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.40.178 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:23:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:23:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:23:13 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:23:13 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:23:13 - OpenVPN > open_tun
. 2020.05.29 23:23:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:23:13 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:23:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.40.0/10.7.40.178/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:23:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.40.178/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.40.254, lease-time: 31536000]
. 2020.05.29 23:23:13 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:23:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:23:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.40.1
. 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.40.1
. 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:18 - Starting Management Interface
. 2020.05.29 23:23:18 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:23:18 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:23:18 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.8.1) to 10.7.40.1)
. 2020.05.29 23:23:19 - Flushing DNS
I 2020.05.29 23:23:23 - Checking route
E 2020.05.29 23:23:23 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:23:23 - Checking route (2° try)
E 2020.05.29 23:23:25 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:23:25 - Checking route (3° try)
E 2020.05.29 23:23:27 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:23:27 - Routing checking failed.
. 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:23:27 - Disconnecting
. 2020.05.29 23:23:27 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:23:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:23:27 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.9 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.40.1
. 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.40.1
. 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:32 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:23:32 - Connection terminated.
. 2020.05.29 23:23:32 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.8.1)
. 2020.05.29 23:23:32 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:23:35 - Checking authorization ...
! 2020.05.29 23:23:36 - Connecting to Jabbah (Netherlands, Alblasserdam)
. 2020.05.29 23:23:36 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:23:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:23:36 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:23:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:23:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:23:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:23:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.108:443
. 2020.05.29 23:23:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:23:36 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:23:36 - OpenVPN > UDP link remote: [AF_INET]213.152.162.108:443
. 2020.05.29 23:23:36 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.108:443, sid=7d32a323 d6ec22b0
. 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:23:36 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:23:36 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:23:36 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:23:36 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Jabbah, emailAddress=info@airvpn.org
. 2020.05.29 23:23:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:23:36 - OpenVPN > [Jabbah] Peer Connection Initiated with [AF_INET]213.152.162.108:443
. 2020.05.29 23:23:37 - OpenVPN > SENT CONTROL [Jabbah]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:23:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.19.200.1,route-gateway 10.19.200.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.19.200.138 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:23:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:23:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:23:37 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:23:37 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:23:37 - OpenVPN > open_tun
. 2020.05.29 23:23:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:23:38 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:23:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.200.0/10.19.200.138/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:23:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.200.138/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.19.200.254, lease-time: 31536000]
. 2020.05.29 23:23:38 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:23:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:23:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.108 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.200.1
. 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.200.1
. 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:43 - Starting Management Interface
. 2020.05.29 23:23:43 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:23:43 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:23:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.40.1) to 10.19.200.1)
. 2020.05.29 23:23:43 - Flushing DNS
I 2020.05.29 23:23:47 - Checking route
E 2020.05.29 23:23:48 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:23:48 - Checking route (2° try)
E 2020.05.29 23:23:49 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:23:49 - Checking route (3° try)
E 2020.05.29 23:23:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:23:52 - Routing checking failed.
. 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:23:52 - Disconnecting
. 2020.05.29 23:23:52 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:23:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:23:52 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.108 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.200.1
. 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.200.1
. 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:23:57 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:23:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:23:57 - Connection terminated.
. 2020.05.29 23:23:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.40.1)
. 2020.05.29 23:23:57 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:24:00 - Checking authorization ...
! 2020.05.29 23:24:01 - Connecting to Capella (Netherlands, Alblasserdam)
. 2020.05.29 23:24:01 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:24:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:24:01 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:24:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:24:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.138:443
. 2020.05.29 23:24:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:24:01 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:24:01 - OpenVPN > UDP link remote: [AF_INET]134.19.179.138:443
. 2020.05.29 23:24:01 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.138:443, sid=f9a8ab1f d5a5c516
. 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:24:01 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:24:01 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:24:01 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:24:01 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capella, emailAddress=info@airvpn.org
. 2020.05.29 23:24:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:24:02 - OpenVPN > [Capella] Peer Connection Initiated with [AF_INET]134.19.179.138:443
. 2020.05.29 23:24:03 - OpenVPN > SENT CONTROL [Capella]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:24:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.33.168.1,route-gateway 10.33.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.168.173 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:24:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:03 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:24:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:24:03 - OpenVPN > open_tun
. 2020.05.29 23:24:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:24:03 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:24:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.168.0/10.33.168.173/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:24:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.168.173/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.168.254, lease-time: 31536000]
. 2020.05.29 23:24:03 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:24:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:24:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.138 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.168.1
. 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.168.1
. 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:08 - Starting Management Interface
. 2020.05.29 23:24:08 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:24:08 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:24:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.200.1) to 10.33.168.1)
. 2020.05.29 23:24:08 - Flushing DNS
I 2020.05.29 23:24:12 - Checking route
E 2020.05.29 23:24:13 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:24:13 - Checking route (2° try)
E 2020.05.29 23:24:15 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:24:15 - Checking route (3° try)
E 2020.05.29 23:24:17 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:24:17 - Routing checking failed.
. 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:24:17 - Disconnecting
. 2020.05.29 23:24:17 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:24:17 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.138 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.168.1
. 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.168.1
. 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:22 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:24:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:24:22 - Connection terminated.
. 2020.05.29 23:24:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.200.1)
. 2020.05.29 23:24:22 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:24:25 - Checking authorization ...
! 2020.05.29 23:24:26 - Connecting to Alphirk (Netherlands, Alblasserdam)
. 2020.05.29 23:24:26 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:24:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:24:26 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:24:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:24:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.146:443
. 2020.05.29 23:24:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:24:26 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:24:26 - OpenVPN > UDP link remote: [AF_INET]109.202.107.146:443
. 2020.05.29 23:24:26 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.146:443, sid=af04fa78 1692de97
. 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:24:26 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:24:26 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:24:26 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:24:26 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org
. 2020.05.29 23:24:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:24:26 - OpenVPN > [Alphirk] Peer Connection Initiated with [AF_INET]109.202.107.146:443
. 2020.05.29 23:24:28 - OpenVPN > SENT CONTROL [Alphirk]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:24:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.7.104.1,route-gateway 10.7.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.104.185 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:24:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:30 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:24:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:24:30 - OpenVPN > open_tun
. 2020.05.29 23:24:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:24:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:24:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.104.0/10.7.104.185/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:24:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.104.185/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.104.254, lease-time: 31536000]
. 2020.05.29 23:24:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:24:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:24:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.104.1
. 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.104.1
. 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:36 - Starting Management Interface
. 2020.05.29 23:24:36 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:24:36 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.168.1) to 10.7.104.1)
. 2020.05.29 23:24:36 - Flushing DNS
I 2020.05.29 23:24:40 - Checking route
E 2020.05.29 23:24:41 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:24:41 - Checking route (2° try)
E 2020.05.29 23:24:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:24:42 - Checking route (3° try)
E 2020.05.29 23:24:45 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:24:45 - Routing checking failed.
. 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:24:45 - Disconnecting
. 2020.05.29 23:24:45 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:24:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:24:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2020.05.29 23:24:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.104.1
. 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.104.1
. 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:24:50 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:24:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:24:50 - Connection terminated.
. 2020.05.29 23:24:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.168.1)
. 2020.05.29 23:24:50 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:24:53 - Checking authorization ...
! 2020.05.29 23:24:54 - Connecting to Musica (Netherlands, Alblasserdam)
. 2020.05.29 23:24:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:24:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:24:54 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:24:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:24:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:24:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.248:443
. 2020.05.29 23:24:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:24:54 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:24:54 - OpenVPN > UDP link remote: [AF_INET]213.152.161.248:443
. 2020.05.29 23:24:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.248:443, sid=e28198b6 5e8347e3
. 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:24:54 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:24:54 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:24:54 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:24:54 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org
. 2020.05.29 23:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:24:54 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.248:443
. 2020.05.29 23:24:56 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:24:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.24.168.1,route-gateway 10.24.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.168.137 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:24:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:24:56 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:24:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:24:56 - OpenVPN > open_tun
. 2020.05.29 23:24:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:24:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:24:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.168.0/10.24.168.137/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:24:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.168.137/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.24.168.254, lease-time: 31536000]
. 2020.05.29 23:24:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:24:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:25:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.248 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.168.1
. 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.168.1
. 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:01 - Starting Management Interface
. 2020.05.29 23:25:01 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:25:01 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:25:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.104.1) to 10.24.168.1)
. 2020.05.29 23:25:01 - Flushing DNS
I 2020.05.29 23:25:05 - Checking route
E 2020.05.29 23:25:06 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:25:06 - Checking route (2° try)
E 2020.05.29 23:25:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:25:07 - Checking route (3° try)
E 2020.05.29 23:25:10 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
E 2020.05.29 23:25:10 - Routing checking failed.
. 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2020.05.29 23:25:10 - Disconnecting
. 2020.05.29 23:25:10 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:25:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:25:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.248 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.168.1
. 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.168.1
. 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:15 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:25:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:25:15 - Connection terminated.
. 2020.05.29 23:25:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.104.1)
. 2020.05.29 23:25:15 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:25:18 - Checking authorization ...
! 2020.05.29 23:25:19 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2020.05.29 23:25:19 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2020.05.29 23:25:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.29 23:25:19 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2020.05.29 23:25:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.05.29 23:25:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:25:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.05.29 23:25:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.137:443
. 2020.05.29 23:25:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144]
. 2020.05.29 23:25:19 - OpenVPN > UDP link local: (not bound)
. 2020.05.29 23:25:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.137:443
. 2020.05.29 23:25:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=78e71c1c f58fe524
. 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.29 23:25:19 - OpenVPN > Validating certificate key usage
. 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2020.05.29 23:25:19 - OpenVPN > VERIFY KU OK
. 2020.05.29 23:25:19 - OpenVPN > Validating certificate extended key usage
. 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.29 23:25:19 - OpenVPN > VERIFY EKU OK
. 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org
. 2020.05.29 23:25:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.29 23:25:19 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.137:443
. 2020.05.29 23:25:20 - OpenVPN > SENT CONTROL [Talitha]: 'PUSH_REQUEST' (status=1)
. 2020.05.29 23:25:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.31.8.1,route-gateway 10.31.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.8.86 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.29 23:25:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:25:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.29 23:25:20 - OpenVPN > interactive service msg_channel=0
. 2020.05.29 23:25:20 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7
. 2020.05.29 23:25:21 - OpenVPN > open_tun
. 2020.05.29 23:25:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap
. 2020.05.29 23:25:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.05.29 23:25:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.8.0/10.31.8.86/255.255.255.0 [SUCCEEDED]
. 2020.05.29 23:25:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.8.86/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.31.8.254, lease-time: 31536000]
. 2020.05.29 23:25:21 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
. 2020.05.29 23:25:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.05.29 23:25:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.8.1
. 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.8.1
. 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:26 - Starting Management Interface
. 2020.05.29 23:25:26 - OpenVPN > Initialization Sequence Completed
. 2020.05.29 23:25:26 - DNS leak protection with packet filtering enabled.
. 2020.05.29 23:25:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.24.168.1) to 10.31.8.1)
. 2020.05.29 23:25:26 - Flushing DNS
I 2020.05.29 23:25:30 - Checking route
E 2020.05.29 23:25:30 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:25:30 - Checking route (2° try)
E 2020.05.29 23:25:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version
. 2020.05.29 23:25:32 - Checking route (3° try)
! 2020.05.29 23:25:34 - Disconnecting
. 2020.05.29 23:25:34 - Management - Send 'signal SIGTERM'
. 2020.05.29 23:25:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2020.05.29 23:25:39 - Connection terminated.
. 2020.05.29 23:25:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.24.168.1)
. 2020.05.29 23:25:39 - DNS leak protection with packet filtering disabled.
I 2020.05.29 23:25:39 - Cancel requested.
. 2020.05.29 23:25:39 - IPv6 restored with packet filtering.
. 2020.05.29 23:25:39 - Flushing DNS
! 2020.05.29 23:25:43 - Session terminated.
E 2020.05.29 23:25:44 - curl: (28) Connection timed out after 10047 milliseconds
. 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.05.29 23:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.0.1
. 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.31.8.1
. 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.31.8.1
. 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.29 23:25:44 - OpenVPN > Closing TUN/TAP interface
. 2020.05.29 23:25:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.29 23:29:14 - Updating systems & servers data ...
. 2020.05.29 23:29:15 - Systems & servers data update completed


-- System --
Operating System: Microsoft Windows NT 10.0.18362.0
Network Interface: Ethernet (Realtek PCIe GbE Family Controller, ID:{198A4B88-7AC3-4DA2-A5C1-795D8721E02F}) - Ethernet - Down
Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{F6255F87-D147-4715-8733-049D327C9F4B}) - Wireless80211 - Down
Network Interface: Local Area Connection* 11 (Microsoft Wi-Fi Direct Virtual Adapter #2, ID:{E9667F7F-5B0B-4621-8B26-A407F18A2A9A}) - Wireless80211 - Down
Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}) - Ethernet - Down
Network Interface: WiFi (Qualcomm Atheros AR938x Wireless Network Adapter, ID:{4134EE65-8265-43FD-974E-8D81DCF65BAF}) - Wireless80211 - Up
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{F5EF2E9E-DB15-11E7-81B0-806E6F6E6963}) - Loopback - Up

Routing:
Address: 0.0.0.0, Mask: 0.0.0.0, Gateway: 192.168.0.1, Interface: 8, Metrics: 40, Flags: , Mss: , Window: , Irtt: 
Address: 169.254.0.0, Mask: 255.255.0.0, Gateway: 192.168.0.50, Interface: 8, Metrics: 41, Flags: , Mss: , Window: , Irtt: 

Default gateways:
192.168.0.1, Qualcomm Atheros AR938x Wireless Network Adapter


-- Windows

-- ipconfig /all
Windows IP Configuration

   Host Name . . . . . . . . . . . . : HOME8
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Ethernet:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller
   Physical Address. . . . . . . . . : 94-DE-80-78-BC-66
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 1:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 12-F3-C1-24-EB-A7
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 11:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : 22-F3-C1-24-EB-A7
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-72-6F-12-3E
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter WiFi:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Qualcomm Atheros AR938x Wireless Network Adapter
   Physical Address. . . . . . . . . : A0-F3-C1-24-EB-A7
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::ec64:e7c9:828c:6b6f%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.0.4(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : 29 May 2020 15:16:37
   Lease Expires . . . . . . . . . . : 30 May 2020 15:16:37
   Default Gateway . . . . . . . . . : 192.168.0.1
   DHCP Server . . . . . . . . . . . : 192.168.0.1
   DHCPv6 IAID . . . . . . . . . . . : 111211457
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-37-78-12-94-DE-80-78-BC-66
   DNS Servers . . . . . . . . . . . : 192.168.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
-- NetworkAdapterConfiguration

Network Adapter: [00000000] Microsoft Kernel Debug Network Adapter
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000000] Microsoft Kernel Debug Network Adapter
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: Microsoft Kernel Debug Network Adapter
    DHCPEnabled: true
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 0
    InterfaceIndex: 11
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: kdnic
    SettingID: {7CBE7845-FCCA-430B-9043-466612618A25}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000001] TAP-Windows Adapter V9
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000001] TAP-Windows Adapter V9
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: TAP-Windows Adapter V9
    DHCPEnabled: true
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 1
    InterfaceIndex: 10
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 00:FF:72:6F:12:3E
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: tap0901
    SettingID: {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter
DNS: 192.168.0.1
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter
    DatabasePath: %SystemRoot%\System32\drivers\etc
    DeadGWDetectEnabled: null
    DefaultIPGateway: 192.168.0.1
    DefaultTOS: null
    DefaultTTL: null
    Description: Qualcomm Atheros AR938x Wireless Network Adapter
    DHCPEnabled: true
    DHCPLeaseExpires: 20200530151637.000000+060
    DHCPLeaseObtained: 20200529151637.000000+060
    DHCPServer: 192.168.0.1
    DNSDomain: null
    DNSDomainSuffixSearchOrder: 
    DNSEnabledForWINSResolution: false
    DNSHostName: HOME8
    DNSServerSearchOrder: 192.168.0.1
    DomainDNSRegistrationEnabled: false
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: true
    GatewayCostMetric: System.UInt16[]
    IGMPLevel: null
    Index: 2
    InterfaceIndex: 8
    IPAddress: 192.168.0.4,fe80::ec64:e7c9:828c:6b6f
    IPConnectionMetric: 40
    IPEnabled: true
    IPFilterSecurityEnabled: false
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: 
    IPSecPermitTCPPorts: 
    IPSecPermitUDPPorts: 
    IPSubnet: 255.255.255.0,64
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: A0:F3:C1:24:EB:A7
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: athr
    SettingID: {4134EE65-8265-43FD-974E-8D81DCF65BAF}
    TcpipNetbiosOptions: 0
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: true
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: 
    WINSSecondaryServer: null

Network Adapter: [00000003] Realtek PCIe GbE Family Controller
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000003] Realtek PCIe GbE Family Controller
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: Realtek PCIe GbE Family Controller
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 3
    InterfaceIndex: 5
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 94:DE:80:78:BC:66
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: rt640x64
    SettingID: {198A4B88-7AC3-4DA2-A5C1-795D8721E02F}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000004] Microsoft Wi-Fi Direct Virtual Adapter
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000004] Microsoft Wi-Fi Direct Virtual Adapter
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: Microsoft Wi-Fi Direct Virtual Adapter
    DHCPEnabled: true
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 4
    InterfaceIndex: 22
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 12:F3:C1:24:EB:A7
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: vwifimp
    SettingID: {F6255F87-D147-4715-8733-049D327C9F4B}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000005] WAN Miniport (SSTP)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000005] WAN Miniport (SSTP)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (SSTP)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 5
    InterfaceIndex: 4
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: RasSstp
    SettingID: {14F63973-417D-430A-913A-8FDF5B6395CF}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000006] WAN Miniport (IKEv2)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000006] WAN Miniport (IKEv2)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (IKEv2)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 6
    InterfaceIndex: 6
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: RasAgileVpn
    SettingID: {2300350F-D959-4B5B-B4C5-9AA99B34C746}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000007] WAN Miniport (L2TP)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000007] WAN Miniport (L2TP)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (L2TP)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 7
    InterfaceIndex: 13
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: Rasl2tp
    SettingID: {9D8B3855-0B7D-4060-AA05-D6929934CE73}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000008] WAN Miniport (PPTP)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000008] WAN Miniport (PPTP)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (PPTP)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 8
    InterfaceIndex: 19
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: PptpMiniport
    SettingID: {CF0B200C-11BD-4FBE-82B3-CE7C4AAED1E8}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000009] WAN Miniport (PPPOE)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000009] WAN Miniport (PPPOE)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (PPPOE)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 9
    InterfaceIndex: 16
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: RasPppoe
    SettingID: {C05E5A13-D325-4A71-9B0D-E5603725C6E1}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000010] WAN Miniport (IP)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000010] WAN Miniport (IP)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (IP)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 10
    InterfaceIndex: 17
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 28:F2:20:52:41:53
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: NdisWan
    SettingID: {C3B10829-0AB9-45B3-82DF-BA08165DA79F}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000011] WAN Miniport (IPv6)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000011] WAN Miniport (IPv6)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (IPv6)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 11
    InterfaceIndex: 18
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 28:E7:20:52:41:53
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: NdisWan
    SettingID: {C8472531-96BD-4975-904C-6C5C216BF348}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000012] WAN Miniport (Network Monitor)
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000012] WAN Miniport (Network Monitor)
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: WAN Miniport (Network Monitor)
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 12
    InterfaceIndex: 15
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 2A:7D:20:52:41:53
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: NdisWan
    SettingID: {A5329D43-8399-4F6E-B937-1ADE604C3D02}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000013] Microsoft Wi-Fi Direct Virtual Adapter
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000013] Microsoft Wi-Fi Direct Virtual Adapter
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: Microsoft Wi-Fi Direct Virtual Adapter
    DHCPEnabled: true
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 13
    InterfaceIndex: 21
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: 22:F3:C1:24:EB:A7
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: vwifimp
    SettingID: {E9667F7F-5B0B-4621-8B26-A407F18A2A9A}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000014] RAS Async Adapter
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000014] RAS Async Adapter
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: RAS Async Adapter
    DHCPEnabled: false
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 14
    InterfaceIndex: 45
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: AsyncMac
    SettingID: {00770D0D-DD7E-43DA-9DF8-29D74507141C}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Network Adapter: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC
DNS: null
Details:
    ArpAlwaysSourceRoute: null
    ArpUseEtherSNAP: null
    Caption: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC
    DatabasePath: null
    DeadGWDetectEnabled: null
    DefaultIPGateway: null
    DefaultTOS: null
    DefaultTTL: null
    Description: Realtek 8812BU Wireless LAN 802.11ac USB NIC
    DHCPEnabled: true
    DHCPLeaseExpires: null
    DHCPLeaseObtained: null
    DHCPServer: null
    DNSDomain: null
    DNSDomainSuffixSearchOrder: null
    DNSEnabledForWINSResolution: null
    DNSHostName: null
    DNSServerSearchOrder: null
    DomainDNSRegistrationEnabled: null
    ForwardBufferMemory: null
    FullDNSRegistrationEnabled: null
    GatewayCostMetric: null
    IGMPLevel: null
    Index: 15
    InterfaceIndex: 9
    IPAddress: null
    IPConnectionMetric: null
    IPEnabled: false
    IPFilterSecurityEnabled: null
    IPPortSecurityEnabled: null
    IPSecPermitIPProtocols: null
    IPSecPermitTCPPorts: null
    IPSecPermitUDPPorts: null
    IPSubnet: null
    IPUseZeroBroadcast: null
    IPXAddress: null
    IPXEnabled: null
    IPXFrameType: null
    IPXMediaType: null
    IPXNetworkNumber: null
    IPXVirtualNetNumber: null
    KeepAliveInterval: null
    KeepAliveTime: null
    MACAddress: null
    MTU: null
    NumForwardPackets: null
    PMTUBHDetectEnabled: null
    PMTUDiscoveryEnabled: null
    ServiceName: RtlWlanu
    SettingID: {6D602A89-D067-4467-BF7C-24A8543E929D}
    TcpipNetbiosOptions: null
    TcpMaxConnectRetransmissions: null
    TcpMaxDataRetransmissions: null
    TcpNumConnections: null
    TcpUseRFC1122UrgentPointer: null
    TcpWindowSize: null
    WINSEnableLMHostsLookup: null
    WINSHostLookupFile: null
    WINSPrimaryServer: null
    WINSScopeID: null
    WINSSecondaryServer: null

Share this post


Link to post

Hello!

Eddie 2.12.4 is more than three years old and is not fully compatible with Windows 10. Please upgrade to Eddie 2.18.9 (latest stable release) and the problem should be resolved. Remove completely Eddie 2.12.4 before upgrading, in particular make sure to delete any file in directory C:\Users\grrrb\AppData\Local\AirVPN

Eddie Windows edition can be downloaded here:
https://airvpn.org/windows

Kind regards
 

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...