Jump to content
Not connected, Your IP: 34.200.218.187
animem12

Eddie keeps restarting and won't connect.

Recommended Posts

Posted ... (edited)

I have tried reinstalling and logging out. Help would be apperciated.


 

. 2020.07.11 22:05:39 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.07.11 22:05:39 - Command line arguments (1): path="home"
. 2020.07.11 22:05:41 - Raise system privileges
. 2020.07.11 22:05:45 - Profile path: C:\Users\ksr75\AppData\Local\Eddie\default.profile
. 2020.07.11 22:05:45 - Reading options from C:\Users\ksr75\AppData\Local\Eddie\default.profile
. 2020.07.11 22:05:46 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2020.07.11 22:05:46 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.07.11 22:05:46 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.07.11 22:05:46 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.07.11 22:05:46 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe)
. 2020.07.11 22:05:46 - Recovery. Unexpected crash?
. 2020.07.11 22:05:46 - Routes, removed an existing route, 184.75.223.211 for gateway 10.4.206.1
. 2020.07.11 22:05:46 - Routes, added a new route, 104.254.90.195 for gateway 10.29.238.1
. 2020.07.11 22:05:46 - Routes, removed an existing route, 184.75.223.211 for gateway 10.4.206.1
. 2020.07.11 22:05:46 - Routes, added a new route, 104.254.90.187 for gateway 10.28.78.1
. 2020.07.11 22:05:46 - Routes, added a new route, 2606:6080:1002:8:3285:30e:de43:8809 for gateway fde6:7a:7d20:18ee::1
. 2020.07.11 22:05:46 - Routes, removed an existing route, 137.63.71.51 for gateway 10.31.78.1
. 2020.07.11 22:05:46 - Routes, removed an existing route, 184.75.223.235 for gateway 10.10.238.1
. 2020.07.11 22:05:47 - Routes, added a new route, 104.254.90.243 for gateway 10.16.78.1
. 2020.07.11 22:05:47 - Routes, added a new route, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c4e::1
. 2020.07.11 22:05:47 - Routes, removed an existing route, 184.75.221.163 for gateway 10.9.46.1
. 2020.07.11 22:05:47 - Routes, removed an existing route, 2606:6080:1001:12:257a:8b87:f80d:7579 for gateway fde6:7a:7d20:52e::1
I 2020.07.11 22:05:47 - Ready
. 2020.07.11 22:05:49 - Collect information about AirVPN completed
I 2020.07.11 22:05:59 - Checking login ...
! 2020.07.11 22:06:00 - Logged in.
I 2020.07.11 22:06:05 - Session starting.
I 2020.07.11 22:06:05 - Checking authorization ...
! 2020.07.11 22:06:06 - Connecting to Tiaki (Netherlands, Alblasserdam)
. 2020.07.11 22:06:06 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:06:06 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:06:06 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:06:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.237:443
. 2020.07.11 22:06:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:06:06 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:06:06 - OpenVPN > UDP link remote: [AF_INET]134.19.179.237:443
. 2020.07.11 22:06:06 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.237:443, sid=d98bc73d 31b51d02
. 2020.07.11 22:06:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:06:06 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:06:06 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:06:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:06:06 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:06:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tiaki, emailAddress=info@airvpn.org
. 2020.07.11 22:06:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:06:07 - OpenVPN > [Tiaki] Peer Connection Initiated with [AF_INET]134.19.179.237:443
. 2020.07.11 22:06:08 - OpenVPN > SENT CONTROL [Tiaki]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:06:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.170.1,dhcp-option DNS6 fde6:7a:7d20:1eaa::1,tun-ipv6,route-gateway 10.34.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1eaa::107e/64 fde6:7a:7d20:1eaa::1,ifconfig 10.34.170.128 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.07.11 22:06:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:06:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:06:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:06:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:08 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:06:08 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:06:08 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:06:08 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:06:08 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:06:08 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:06:08 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:06:08 - OpenVPN > open_tun
. 2020.07.11 22:06:08 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:06:08 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:06:08 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:06:08 - Disconnecting
. 2020.07.11 22:06:08 - Connection terminated.
. 2020.07.11 22:06:11 - Waiting for latency tests (194 to go)
. 2020.07.11 22:06:13 - Waiting for latency tests (147 to go)
. 2020.07.11 22:06:14 - Waiting for latency tests (116 to go)
. 2020.07.11 22:06:15 - Waiting for latency tests (71 to go)
. 2020.07.11 22:06:16 - Waiting for latency tests (46 to go)
. 2020.07.11 22:06:17 - Waiting for latency tests (22 to go)
. 2020.07.11 22:06:20 - Waiting for latency tests (2 to go)
I 2020.07.11 22:06:22 - Checking authorization ...
! 2020.07.11 22:06:23 - Connecting to Chort (Canada, Toronto, Ontario)
. 2020.07.11 22:06:23 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:06:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:06:23 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:06:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443
. 2020.07.11 22:06:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:06:23 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:06:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.237:443
. 2020.07.11 22:06:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=e4dce6af c6bf10a8
. 2020.07.11 22:06:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:06:23 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:06:23 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:06:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:06:23 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:06:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org
. 2020.07.11 22:06:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:06:24 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443
. 2020.07.11 22:06:25 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:06:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.42.1,dhcp-option DNS6 fde6:7a:7d20:a2a::1,tun-ipv6,route-gateway 10.14.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a2a::1069/64 fde6:7a:7d20:a2a::1,ifconfig 10.14.42.107 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2020.07.11 22:06:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:06:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:06:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:06:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:25 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:06:25 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:06:25 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:06:25 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:06:25 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:06:25 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:06:25 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:06:25 - OpenVPN > open_tun
. 2020.07.11 22:06:25 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:06:25 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:06:25 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:06:25 - Disconnecting
. 2020.07.11 22:06:25 - Connection terminated.
I 2020.07.11 22:06:28 - Checking authorization ...
! 2020.07.11 22:06:29 - Connecting to Sharatan (Canada, Toronto, Ontario)
. 2020.07.11 22:06:29 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:06:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:06:29 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:06:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443
. 2020.07.11 22:06:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:06:29 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:06:29 - OpenVPN > UDP link remote: [AF_INET]104.254.90.197:443
. 2020.07.11 22:06:29 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=d0d2beb5 8640c8c9
. 2020.07.11 22:06:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:06:29 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:06:29 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:06:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:06:29 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:06:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org
. 2020.07.11 22:06:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:06:29 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443
. 2020.07.11 22:06:30 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:06:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.234.1,dhcp-option DNS6 fde6:7a:7d20:19ea::1,tun-ipv6,route-gateway 10.29.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19ea::1098/64 fde6:7a:7d20:19ea::1,ifconfig 10.29.234.154 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.07.11 22:06:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:06:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:06:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:06:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:31 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:06:31 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:06:31 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:06:31 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:06:31 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:06:31 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:06:31 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:06:31 - OpenVPN > open_tun
. 2020.07.11 22:06:31 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:06:31 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:06:31 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:06:31 - Disconnecting
. 2020.07.11 22:06:31 - Connection terminated.
I 2020.07.11 22:06:34 - Checking authorization ...
! 2020.07.11 22:06:34 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2020.07.11 22:06:34 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:06:34 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:06:34 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:06:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:06:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:06:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443
. 2020.07.11 22:06:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:06:34 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:06:34 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443
. 2020.07.11 22:06:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=1dcd6b31 25a08ce7
. 2020.07.11 22:06:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:06:35 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:06:35 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:06:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:06:35 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:06:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org
. 2020.07.11 22:06:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:06:35 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443
! 2020.07.11 22:06:36 - Disconnecting
. 2020.07.11 22:06:36 - Sending soft termination signal
. 2020.07.11 22:06:39 - Connection terminated.
. 2020.07.11 22:06:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.07.11 22:06:39 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:06:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.202.1,dhcp-option DNS6 fde6:7a:7d20:1bca::1,tun-ipv6,route-gateway 10.31.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bca::1062/64 fde6:7a:7d20:1bca::1,ifconfig 10.31.202.100 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.07.11 22:06:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:06:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:06:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:06:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:06:39 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:06:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:06:39 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:06:39 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:06:39 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:06:39 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:06:39 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:06:39 - OpenVPN > open_tun
. 2020.07.11 22:06:39 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:06:39 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:06:39 - OpenVPN > Exiting due to fatal error
I 2020.07.11 22:06:39 - Cancel requested.
! 2020.07.11 22:06:39 - Session terminated.
I 2020.07.11 22:10:09 - Session starting.
I 2020.07.11 22:10:10 - Checking authorization ...
! 2020.07.11 22:10:10 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2020.07.11 22:10:10 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:10:10 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:10:10 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:10:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:10:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:10:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:10:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:10:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443
. 2020.07.11 22:10:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:10:10 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:10:10 - OpenVPN > UDP link remote: [AF_INET]104.254.90.189:443
. 2020.07.11 22:10:10 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=da877ebb 94e9eb78
. 2020.07.11 22:10:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:10:10 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:10:10 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:10:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:10:10 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:10:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org
. 2020.07.11 22:10:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:10:11 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443
. 2020.07.11 22:10:12 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:10:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.74.1,dhcp-option DNS6 fde6:7a:7d20:184a::1,tun-ipv6,route-gateway 10.28.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:184a::1046/64 fde6:7a:7d20:184a::1,ifconfig 10.28.74.72 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.07.11 22:10:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:10:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:184a::1'
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:10:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:10:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:10:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:10:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:10:12 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:10:12 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:10:12 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:10:12 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:10:12 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:10:12 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:10:12 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:10:12 - OpenVPN > open_tun
. 2020.07.11 22:10:12 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:10:12 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:10:12 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:10:12 - Disconnecting
. 2020.07.11 22:10:12 - Connection terminated.
I 2020.07.11 22:10:15 - Checking authorization ...
! 2020.07.11 22:10:16 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2020.07.11 22:10:16 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:10:16 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:10:16 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:10:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:10:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:10:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:10:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:10:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443
. 2020.07.11 22:10:16 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:10:16 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:10:16 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443
. 2020.07.11 22:10:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=52aad529 c490a086
. 2020.07.11 22:10:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:10:16 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:10:16 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:10:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:10:16 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:10:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org
. 2020.07.11 22:10:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:10:17 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443
! 2020.07.11 22:10:18 - Disconnecting
. 2020.07.11 22:10:18 - Sending soft termination signal
. 2020.07.11 22:10:21 - Connection terminated.
. 2020.07.11 22:10:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.07.11 22:10:21 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:10:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.202.1,dhcp-option DNS6 fde6:7a:7d20:1bca::1,tun-ipv6,route-gateway 10.31.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bca::1062/64 fde6:7a:7d20:1bca::1,ifconfig 10.31.202.100 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.07.11 22:10:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:10:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bca::1'
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:10:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:10:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:10:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:10:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:10:21 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:10:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:10:21 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:10:21 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:10:21 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:10:21 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:10:21 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:10:21 - OpenVPN > open_tun
. 2020.07.11 22:10:21 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:10:21 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:10:21 - OpenVPN > Exiting due to fatal error
I 2020.07.11 22:10:21 - Cancel requested.
! 2020.07.11 22:10:21 - Session terminated.
I 2020.07.11 22:13:12 - Session starting.
I 2020.07.11 22:13:12 - Checking authorization ...
! 2020.07.11 22:13:13 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2020.07.11 22:13:13 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:13:13 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:13:13 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:13:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443
. 2020.07.11 22:13:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:13:13 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:13:13 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443
. 2020.07.11 22:13:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=bb432ec1 95242f54
. 2020.07.11 22:13:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:13:13 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:13:13 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:13:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:13:13 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:13:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org
. 2020.07.11 22:13:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:13:14 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443
. 2020.07.11 22:13:15 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:13:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.106.1,dhcp-option DNS6 fde6:7a:7d20:96a::1,tun-ipv6,route-gateway 10.13.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:96a::103b/64 fde6:7a:7d20:96a::1,ifconfig 10.13.106.61 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.07.11 22:13:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:13:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:96a::1'
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:13:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:13:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:13:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:15 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:13:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:13:15 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:13:15 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:13:15 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:13:15 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:13:15 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:13:15 - OpenVPN > open_tun
. 2020.07.11 22:13:15 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:13:15 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:13:15 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:13:15 - Disconnecting
. 2020.07.11 22:13:15 - Connection terminated.
I 2020.07.11 22:13:18 - Checking authorization ...
! 2020.07.11 22:13:19 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2020.07.11 22:13:19 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:13:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:13:19 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:13:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443
. 2020.07.11 22:13:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:13:19 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:13:19 - OpenVPN > UDP link remote: [AF_INET]184.75.221.45:443
. 2020.07.11 22:13:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=d0aa016d 7d6bfb81
. 2020.07.11 22:13:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:13:19 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:13:19 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:13:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:13:19 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:13:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2020.07.11 22:13:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:13:19 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443
. 2020.07.11 22:13:21 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:13:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.202.1,dhcp-option DNS6 fde6:7a:7d20:1aca::1,tun-ipv6,route-gateway 10.30.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1aca::10ed/64 fde6:7a:7d20:1aca::1,ifconfig 10.30.202.239 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.07.11 22:13:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:13:21 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1aca::1'
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:13:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:13:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:13:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:21 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:13:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:13:21 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:13:21 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:13:21 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:13:21 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:13:21 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:13:21 - OpenVPN > open_tun
. 2020.07.11 22:13:21 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:13:21 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:13:21 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:13:21 - Disconnecting
. 2020.07.11 22:13:21 - Connection terminated.
I 2020.07.11 22:13:22 - Cancel requested.
! 2020.07.11 22:13:22 - Session terminated.
I 2020.07.11 22:13:37 - Session starting.
I 2020.07.11 22:13:37 - Checking authorization ...
! 2020.07.11 22:13:38 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2020.07.11 22:13:38 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:13:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:13:38 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:13:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443
. 2020.07.11 22:13:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:13:38 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:13:38 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443
. 2020.07.11 22:13:38 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=b0d6fc34 63066dfd
. 2020.07.11 22:13:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:13:38 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:13:38 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:13:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:13:38 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:13:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org
. 2020.07.11 22:13:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:13:39 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443
. 2020.07.11 22:13:40 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:13:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.202.1,dhcp-option DNS6 fde6:7a:7d20:1bca::1,tun-ipv6,route-gateway 10.31.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bca::1062/64 fde6:7a:7d20:1bca::1,ifconfig 10.31.202.100 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.07.11 22:13:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:13:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:13:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:13:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:40 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:13:40 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:13:40 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:13:40 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:13:40 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:13:40 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:13:40 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:13:40 - OpenVPN > open_tun
. 2020.07.11 22:13:40 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:13:40 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:13:40 - OpenVPN > Exiting due to fatal error
! 2020.07.11 22:13:40 - Disconnecting
. 2020.07.11 22:13:40 - Connection terminated.
I 2020.07.11 22:13:43 - Checking authorization ...
! 2020.07.11 22:13:44 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2020.07.11 22:13:44 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.07.11 22:13:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.07.11 22:13:44 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.07.11 22:13:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.07.11 22:13:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.07.11 22:13:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443
. 2020.07.11 22:13:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.07.11 22:13:44 - OpenVPN > UDP link local: (not bound)
. 2020.07.11 22:13:44 - OpenVPN > UDP link remote: [AF_INET]184.75.223.197:443
. 2020.07.11 22:13:44 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=ac38d9f2 aff4da65
. 2020.07.11 22:13:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.07.11 22:13:44 - OpenVPN > VERIFY KU OK
. 2020.07.11 22:13:44 - OpenVPN > Validating certificate extended key usage
. 2020.07.11 22:13:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.07.11 22:13:44 - OpenVPN > VERIFY EKU OK
. 2020.07.11 22:13:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org
. 2020.07.11 22:13:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.07.11 22:13:44 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443
! 2020.07.11 22:13:45 - Disconnecting
. 2020.07.11 22:13:45 - Sending soft termination signal
. 2020.07.11 22:13:48 - Connection terminated.
. 2020.07.11 22:13:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.07.11 22:13:48 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1)
. 2020.07.11 22:13:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.42.1,dhcp-option DNS6 fde6:7a:7d20:192a::1,tun-ipv6,route-gateway 10.29.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:192a::10a7/64 fde6:7a:7d20:192a::1,ifconfig 10.29.42.169 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.07.11 22:13:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.07.11 22:13:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.07.11 22:13:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.07.11 22:13:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.07.11 22:13:48 - OpenVPN > interactive service msg_channel=0
. 2020.07.11 22:13:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=60:f2:62:89:2c:72
. 2020.07.11 22:13:48 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.07.11 22:13:48 - OpenVPN > GetBestInterfaceEx() returned if=4
. 2020.07.11 22:13:48 - OpenVPN > GDG6: II=4 DP=::/3 NH=fe80::8
. 2020.07.11 22:13:48 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.07.11 22:13:48 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=4
. 2020.07.11 22:13:48 - OpenVPN > open_tun
. 2020.07.11 22:13:48 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{1AC25C0C-91CC-413E-9963-FEC10EE837F6}.tap
. 2020.07.11 22:13:48 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2020.07.11 22:13:48 - OpenVPN > Exiting due to fatal error
I 2020.07.11 22:13:48 - Cancel requested.
! 2020.07.11 22:13:48 - Session terminated.

Edited ... by giganerd
Apply LOG format to logs

Share this post


Link to post

In Logs tab, click the lifebelt icon and paste or upload the output here.


» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...