xm6g6 0 Posted ... Hey folks. I'm a complete newbie to VPN (but not computers though). After doing a fair amount of reading I signed up with AirVPN. More online security is always better, but initially what started me on this path was a DMCA warning due to downloading the one show that isn't available on my cable. Just to be clear, I'm in the US and using a Windows 10 Pro computer. Before installing 64bit Eddie 2.18.9, I went to ipleak.net. That site showed everything I expected it to, pre-vpn. Then I installed Eddie, connected to the suggested server (Canada), and returned to ipleak.net. Then it showed an AirVPN Canada server address, and says "No forwarded IP detected. If you are using a proxy, it's a transparent proxy." Then I added their magnet torrent link to qbittorrent (which I'm new to, too, I've been using utorrent for years) and the Torrent Address detection shows IP4 addresses from the vpn - I'm still trying to learn how to read/decipher IP6's. I ran ipconfig /all with the vpn turned on, and then again with vpn turned off. Both results showed the Windows IP Configuration as the same. With vpn off, it first shows "Ethernet adapter Ethernet" then "Unknown adapter Local Area Connection". With vpn on it first shows "Unknown adapter Local Area Connection" then "Ethernet adapter Ethernet". I thought it odd that it swapped their order. The Ethernet adapter Ethernet section is, line for line, exactly the same for vpn on and vpn off. The Unknown adapter Local Area Connection, though, has differences. With vpn off, it shows the stats for: Media State Connection-specific DNS Suffix Description Physical Address DHCP Enabled Autoconfiguration Enabled With vpn on, it shows the stats for: Connection-specific DNS Suffix Description Physical Address DHCP Enabled Autoconfiguration Enabled IPv6 Address Link-local IPv6 Address IPv4 Address Subnet Mask Lease Obtained Lease Expires Default Gateway DHCP Server DHCPv6 IAID DHCPv6 Client DUID DNS Servers NetBIOS over Tcpip What I'm hoping to learn now is how to confirm that I'm properly using the vpn for browsing, and more importantly, how to coordinate qbittorrent to properly work with (within?) the vpn. I found the 2013 thread "Guide to Setting Up VPN Just for Torrenting on Windows." This was written for OpenVPN, and it's more technical that I can (at the moment) comprehend. Maybe if it was as technical and using Eddie I could work my way through it easier. In the main post there's a single Eddie reference: Instead of using the client obtained from OpenVPN directly, as described in Part 1, you can use Eddie to set up the VPN. You cannot use "network lock" though. In fact, the VPN does not even have to be done with OpenVPN. The techniques after setting up the VPN have no dependence on OpenVPN being used. Doesn't not having the network lock kind of defeat the purpose maintaining anonymity? Following through the guides linked to from LZ1, I went to the "Help with port forwarding" thread. From that I went into Eddie and viewed stats, noted what the VPN Port is and in qbittorrent, went into settings/connection and changed the number for "Port used for incoming connections" to the AirVPN port shown, and I unchecked "Use UPnP/NAT-PMP port forwarding from my router". Then with AirVPN connected I returned to ipleak.net and checked the Torrent Address detection. Though the list of ip's changed repeatedly all the IP4 addresses, half of the IP4's were always the Canadian address shown being connected to (starting with 137.63.), and the other half is an address I don't recognize (starting with 75.75.). All IP4's and IP6's show the port that is listed as AirVPN's VPN Port (the same as the one I changed to in qbittorrent). As I still cannot decipher the IP6 numbers I'm still not comfortable with it all yet. So how does one confirm that they're properly set up with the vpn for browsing, and ensure that their torrenting is being properly funneled through the vpn? Thanks for any help! Quote Share this post Link to post
xm6g6 0 Posted ... I've been keeping connected to the Canadian server and doing some web surfing. Nothing seems any different except for a single website that says it cannot be reached with vpn on but as soon as I shut Eddie down that page loads. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 12 hours ago, xm6g6 said: Then I added their magnet torrent link to qbittorrent (which I'm new to, too, I've been using utorrent for years) and the Torrent Address detection shows IP4 addresses from the vpn - I'm still trying to learn how to read/decipher IP6's. Did you mean you can't read IPv6 addresses yourself or that qB doesn't bind to v6 and you don't know why? 13 hours ago, xm6g6 said: What I'm hoping to learn now is how to confirm that I'm properly using the vpn for browsing, and more importantly, how to coordinate qbittorrent to properly work with (within?) the vpn. I found the 2013 thread "Guide to Setting Up VPN Just for Torrenting on Windows." This was written for OpenVPN, and it's more technical that I can (at the moment) comprehend. Maybe if it was as technical and using Eddie I could work my way through it easier. In the main post there's a single Eddie reference: Don't use it, it's old. See https://github.com/tool-maker/VPN_just_for_torrents/wiki/Guide-to-Setting-Up-VPN-Just-for-Torrenting-on-Windows instead. But with qB you don't need that, see below. 13 hours ago, xm6g6 said: Doesn't not having the network lock kind of defeat the purpose maintaining anonymity? Let's first abolish the term anonymity. You are NOT anonymous when you are connected to AirVPN. Pseudonymous, yes. Now. NetLock is just a set of firewall rules blocking connections outside the VPN, not more, not less. Pretty much all programs will use the VPN if its metric is lower (read: priority is higher) than that of the "normal" connection, but there are some exceptions which try to break out of it, like WebRTC in browsers (for usually legitimate reasons, I might add!). These exceptions are what NetLock is good for. qB is not such an exception. NetLock is actually not needed in your use case because qBittorrent can bind to the VPN adapter directly. That way, if the connection breaks, so does qB's connections. If you reconnect, so does qB. 13 hours ago, xm6g6 said: Following through the guides linked to from LZ1, I went to the "Help with port forwarding" thread. From that I went into Eddie and viewed stats, noted what the VPN Port is and in qbittorrent, went into settings/connection and changed the number for "Port used for incoming connections" to the AirVPN port shown, and I unchecked "Use UPnP/NAT-PMP port forwarding from my router". Then with AirVPN connected I returned to ipleak.net and checked the Torrent Address detection. Though the list of ip's changed repeatedly all the IP4 addresses, half of the IP4's were always the Canadian address shown being connected to (starting with 137.63.), and the other half is an address I don't recognize (starting with 75.75.). All IP4's and IP6's show the port that is listed as AirVPN's VPN Port (the same as the one I changed to in qbittorrent). As I still cannot decipher the IP6 numbers I'm still not comfortable with it all yet. I don't understand what you want to do here at all, sorry. Maybe some pictures will help? 13 hours ago, xm6g6 said: So how does one confirm that they're properly set up with the vpn for browsing, and ensure that their torrenting is being properly funneled through the vpn? Well.. ipleak.net. You simply need to learn how to interpret its output. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... Re IP6 addresses, I cannot read them myself. In fact before all this started I'd never seen an IP6 address. As yet I haven't used qB with AirVPN because I don't know if I've got everything set up properly and don't know how to test it for confirmation. 10 hours ago, OpenSourcerer said: I don't understand what you want to do here at all, sorry. Maybe some pictures will help? I was hesitant to share any pics because I don't know what info is .... sensitive .... and should be blurred out. I know I still need to learn how to read this stuff, that's why I'm here :) With Eddie connected the ipleak IP4 server shown is listed in the Eddie stats as IP Entry and IPv4 Exit. The ipleak IP6 server shown is listed in the Eddie stats as IPv6 Exit. For the ipleak Torrent Address Detection, the IP4 address that I mentioned that I'd never seen before is in Eddie's Stats as Real IP detected. This is the IP4 address shown in ipleak when Eddie is disconnected, so I'm guessing that this is my actual address (at least for the moment until or unless my isp resets it or something). When I just ran the detection, the two different IP6 addresses shown are not the IP6 Exit address, they are two different addresses that aren't listed in Eddie's Stats. Of the ten addresses shown in the detection, three are the IP4 Exit, three are the "Real IP detected". Two are one IP6 address, and two are another IP6 address. So now with the knowledge of what my IP4 and IP6 are with Eddie not connected I reconnected Eddie and returned to ipleak. Of the ten IP addresses shown, half are through Eddie, and the other half are my actual addresses.. I'm guessing then that I'm leaking ip addresses? Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 9 hours ago, xm6g6 said: Re IP6 addresses, I cannot read them myself. In fact before all this started I'd never seen an IP6 address. Have you tried a beginner's tutorial on IPv6? Like:http://www.steves-internet-guide.com/ipv6-guide/ and in a bit more detail:https://www.tutorialspoint.com/ipv6/ipv6_quick_guide.htm 9 hours ago, xm6g6 said: With Eddie connected the ipleak IP4 server shown is listed in the Eddie stats as IP Entry and IPv4 Exit. The ipleak IP6 server shown is listed in the Eddie stats as IPv6 Exit. If I got it right, then the tunnel is working. 9 hours ago, xm6g6 said: For the ipleak Torrent Address Detection, the IP4 address that I mentioned that I'd never seen before is in Eddie's Stats as Real IP detected. This is the IP4 address shown in ipleak when Eddie is disconnected, so I'm guessing that this is my actual address (at least for the moment until or unless my isp resets it or something). Yes, qBittorrent is not using the VPN. In its settings > Advanced, set Bind to interface (or similar) to TAP-Windows Adapter. 9 hours ago, xm6g6 said: When I just ran the detection, the two different IP6 addresses shown are not the IP6 Exit address, they are two different addresses that aren't listed in Eddie's Stats. Of the ten addresses shown in the detection, three are the IP4 Exit, three are the "Real IP detected". Two are one IP6 address, and two are another IP6 address. I think you mean the DNS tests. They indicate DNS leaks, DNS resolution queries outside the tunnel. One simple solution is to enable Network Lock in Eddie. Another is to disable Smart Multi-homed Address Resolution, otherwise referred to as simply SmartDNS. 9 hours ago, xm6g6 said: So now with the knowledge of what my IP4 and IP6 are with Eddie not connected I reconnected Eddie and returned to ipleak. Of the ten IP addresses shown, half are through Eddie, and the other half are my actual addresses.. I'm guessing then that I'm leaking ip addresses? Yes, you do. As written, simple fix is to enable Network Lock in Eddie. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... On 11/26/2020 at 6:28 AM, OpenSourcerer said: Yes, you do. As written, simple fix is to enable Network Lock in Eddie. This is how my settings were, and still are. Have I missed something? Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Tick Force all network interfaces for DNS to fix the DNS leaks when SmartDNS is enabled. And whether NetLock works can be seen in the logs, or better, in the support file (Logs > lifebelt icon) after you connect. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... 10 hours ago, OpenSourcerer said: Tick Force all network interfaces for DNS to fix the DNS leaks when SmartDNS is enabled. I enabled Force all network interfaces for DNS and ipleaks is still seeing my ip address. Does everyone have "Your content will need to be approved by a moderator" or just new people? Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 2 hours ago, xm6g6 said: I enabled Force all network interfaces for DNS and ipleaks is still seeing my ip address. Of course it does, it only fixes DNS leaks. Can you post a support file, please? Logs > lifebelt icon, either paste or upload it here. 2 hours ago, xm6g6 said: Does everyone have "Your content will need to be approved by a moderator" or just new people? New ones and those on permanent moderation queue after warning points. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... (edited) 12 hours ago, OpenSourcerer said: Can you post a support file, please? Logs > lifebelt icon, either paste or upload it here. Eddie System/Environment Report - 12/1/2020 - 12:09 AM UTC Eddie version: 2.18.9 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19041.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\xm6g6\AppData\Local\Eddie\default.profile Data path: C:\Users\xm6g6\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: Yes, Talitha Detected DNS: 10.31.26.1, 75.75.75.75, 75.75.76.76, fde6:7a:7d20:1b1a::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 113 ms Test Ping IPv6: 115 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) advanced.expert: True windows.dns.force_all_interfaces: True ---------------------------- Logs: . 2020.11.29 20:08:51 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19041.0, Mono/.Net: v4.0.30319 . 2020.11.29 20:08:52 - Command line arguments (1): path="home" . 2020.11.29 20:08:54 - Profile path: C:\Users\xm6g6\AppData\Local\Eddie\default.profile . 2020.11.29 20:08:54 - Reading options from C:\Users\xm6g6\AppData\Local\Eddie\default.profile . 2020.11.29 20:08:57 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2020.11.29 20:08:57 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.11.29 20:08:57 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2020.11.29 20:08:57 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2020.11.29 20:08:57 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe) I 2020.11.29 20:08:59 - Ready . 2020.11.29 20:09:00 - Collect information about AirVPN completed I 2020.11.29 20:27:48 - Session starting. I 2020.11.29 20:27:48 - Checking authorization ... ! 2020.11.29 20:27:49 - Connecting to Talitha (Netherlands, Alblasserdam) . 2020.11.29 20:27:49 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.11.29 20:27:49 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.11.29 20:27:49 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.11.29 20:27:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.11.29 20:27:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.11.29 20:27:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.11.29 20:27:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.11.29 20:27:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.140:443 . 2020.11.29 20:27:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.11.29 20:27:49 - OpenVPN > UDP link local: (not bound) . 2020.11.29 20:27:49 - OpenVPN > UDP link remote: [AF_INET]213.152.161.140:443 . 2020.11.29 20:27:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.140:443, sid=7ec6e8d7 2bc88a25 . 2020.11.29 20:27:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.29 20:27:49 - OpenVPN > VERIFY KU OK . 2020.11.29 20:27:49 - OpenVPN > Validating certificate extended key usage . 2020.11.29 20:27:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.29 20:27:49 - OpenVPN > VERIFY EKU OK . 2020.11.29 20:27:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.29 20:27:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.29 20:27:50 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.140:443 . 2020.11.29 20:27:51 - OpenVPN > SENT CONTROL [Talitha]: 'PUSH_REQUEST' (status=1) . 2020.11.29 20:27:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.26.1,dhcp-option DNS6 fde6:7a:7d20:1b1a::1,tun-ipv6,route-gateway 10.31.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b1a::10ab/64 fde6:7a:7d20:1b1a::1,ifconfig 10.31.26.173 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.11.29 20:27:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.11.29 20:27:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.11.29 20:27:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.11.29 20:27:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 20:27:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 20:27:51 - OpenVPN > interactive service msg_channel=0 . 2020.11.29 20:27:51 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=12 HWADDR=bc:5f:f4:bd:0d:42 . 2020.11.29 20:27:51 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.11.29 20:27:51 - OpenVPN > GetBestInterfaceEx() returned if=12 . 2020.11.29 20:27:51 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::487c:76ff:fec2:2b2f . 2020.11.29 20:27:51 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.11.29 20:27:51 - OpenVPN > ROUTE6_GATEWAY fe80::487c:76ff:fec2:2b2f I=12 . 2020.11.29 20:27:51 - OpenVPN > open_tun . 2020.11.29 20:27:51 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{2E42B396-159C-4597-85B0-B11280854B7F}.tap . 2020.11.29 20:27:51 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.11.29 20:27:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.26.0/10.31.26.173/255.255.255.0 [SUCCEEDED] . 2020.11.29 20:27:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.26.173/255.255.255.0 on interface {2E42B396-159C-4597-85B0-B11280854B7F} [DHCP-serv: 10.31.26.254, lease-time: 31536000] . 2020.11.29 20:27:52 - OpenVPN > Successful ARP Flush on interface [24] {2E42B396-159C-4597-85B0-B11280854B7F} . 2020.11.29 20:27:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=24 fde6:7a:7d20:1b1a::10ab store=active . 2020.11.29 20:27:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:1b1a::1 validate=no . 2020.11.29 20:27:54 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b1a::/64 -> fde6:7a:7d20:1b1a::10ab metric 0) dev Local Area Connection . 2020.11.29 20:27:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b1a::/64 interface=24 fe80::8 store=active . 2020.11.29 20:27:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.11.29 20:27:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.140 MASK 255.255.255.255 10.0.0.1 . 2020.11.29 20:27:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.11.29 20:27:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.26.1 . 2020.11.29 20:27:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.11.29 20:27:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.26.1 . 2020.11.29 20:27:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.11.29 20:27:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.11.29 20:27:59 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1b1a::1 metric -1) dev Local Area Connection . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=24 fe80::8 store=active . 2020.11.29 20:27:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.11.29 20:27:59 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1b1a::1 metric -1) dev Local Area Connection . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=24 fe80::8 store=active . 2020.11.29 20:27:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.11.29 20:27:59 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1b1a::1 metric -1) dev Local Area Connection . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=24 fe80::8 store=active . 2020.11.29 20:27:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.11.29 20:27:59 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1b1a::1 metric -1) dev Local Area Connection . 2020.11.29 20:27:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=24 fe80::8 store=active . 2020.11.29 20:27:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.11.29 20:27:59 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2020.11.29 20:27:59 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.11.29 20:27:59 - DNS leak protection with packet filtering enabled. . 2020.11.29 20:27:59 - Routes, added a new route, 213.152.161.138 for gateway 10.31.26.1 . 2020.11.29 20:28:00 - Routes, added a new route, 2a00:1678:2470:6:6f0d:8828:9fc4:bbdd for gateway fde6:7a:7d20:1b1a::1 . 2020.11.29 20:28:00 - Flushing DNS I 2020.11.29 20:28:00 - Checking route IPv4 I 2020.11.29 20:28:00 - Checking route IPv6 I 2020.11.29 20:28:04 - Checking DNS ! 2020.11.29 20:28:05 - Connected. . 2020.11.29 20:28:05 - OpenVPN > Initialization Sequence Completed . 2020.11.29 20:39:01 - Collect information about AirVPN completed . 2020.11.29 21:27:47 - Above log line repeated 1 times more . 2020.11.29 21:27:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.29 21:27:47 - OpenVPN > VERIFY KU OK . 2020.11.29 21:27:47 - OpenVPN > Validating certificate extended key usage . 2020.11.29 21:27:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.29 21:27:47 - OpenVPN > VERIFY EKU OK . 2020.11.29 21:27:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.29 21:27:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 21:27:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 21:27:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.29 21:39:09 - Collect information about AirVPN completed . 2020.11.29 22:27:43 - Above log line repeated 1 times more . 2020.11.29 22:27:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.29 22:27:43 - OpenVPN > VERIFY KU OK . 2020.11.29 22:27:43 - OpenVPN > Validating certificate extended key usage . 2020.11.29 22:27:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.29 22:27:43 - OpenVPN > VERIFY EKU OK . 2020.11.29 22:27:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.29 22:27:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 22:27:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 22:27:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.29 22:39:18 - Collect information about AirVPN completed . 2020.11.29 23:27:40 - Above log line repeated 1 times more . 2020.11.29 23:27:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.29 23:27:40 - OpenVPN > VERIFY KU OK . 2020.11.29 23:27:40 - OpenVPN > Validating certificate extended key usage . 2020.11.29 23:27:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.29 23:27:40 - OpenVPN > VERIFY EKU OK . 2020.11.29 23:27:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.29 23:27:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 23:27:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.29 23:27:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.29 23:39:28 - Collect information about AirVPN completed . 2020.11.30 00:27:37 - Above log line repeated 1 times more . 2020.11.30 00:27:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 00:27:37 - OpenVPN > VERIFY KU OK . 2020.11.30 00:27:37 - OpenVPN > Validating certificate extended key usage . 2020.11.30 00:27:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 00:27:37 - OpenVPN > VERIFY EKU OK . 2020.11.30 00:27:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 00:27:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 00:27:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 00:27:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 00:39:36 - Collect information about AirVPN completed . 2020.11.30 01:27:35 - Above log line repeated 1 times more . 2020.11.30 01:27:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 01:27:35 - OpenVPN > VERIFY KU OK . 2020.11.30 01:27:35 - OpenVPN > Validating certificate extended key usage . 2020.11.30 01:27:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 01:27:35 - OpenVPN > VERIFY EKU OK . 2020.11.30 01:27:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 01:27:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 01:27:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 01:27:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 01:39:45 - Collect information about AirVPN completed . 2020.11.30 02:27:32 - Above log line repeated 1 times more . 2020.11.30 02:27:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 02:27:32 - OpenVPN > VERIFY KU OK . 2020.11.30 02:27:32 - OpenVPN > Validating certificate extended key usage . 2020.11.30 02:27:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 02:27:32 - OpenVPN > VERIFY EKU OK . 2020.11.30 02:27:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 02:27:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 02:27:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 02:27:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 02:39:55 - Collect information about AirVPN completed . 2020.11.30 03:27:29 - Above log line repeated 1 times more . 2020.11.30 03:27:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 03:27:29 - OpenVPN > VERIFY KU OK . 2020.11.30 03:27:29 - OpenVPN > Validating certificate extended key usage . 2020.11.30 03:27:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 03:27:29 - OpenVPN > VERIFY EKU OK . 2020.11.30 03:27:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 03:27:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 03:27:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 03:27:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 03:40:04 - Collect information about AirVPN completed . 2020.11.30 04:27:25 - Above log line repeated 1 times more . 2020.11.30 04:27:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 04:27:25 - OpenVPN > VERIFY KU OK . 2020.11.30 04:27:25 - OpenVPN > Validating certificate extended key usage . 2020.11.30 04:27:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 04:27:25 - OpenVPN > VERIFY EKU OK . 2020.11.30 04:27:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 04:27:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 04:27:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 04:27:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 04:40:14 - Collect information about AirVPN completed . 2020.11.30 05:27:22 - Above log line repeated 1 times more . 2020.11.30 05:27:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 05:27:22 - OpenVPN > VERIFY KU OK . 2020.11.30 05:27:22 - OpenVPN > Validating certificate extended key usage . 2020.11.30 05:27:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 05:27:22 - OpenVPN > VERIFY EKU OK . 2020.11.30 05:27:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 05:27:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 05:27:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 05:27:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 05:40:23 - Collect information about AirVPN completed . 2020.11.30 06:27:19 - Above log line repeated 1 times more . 2020.11.30 06:27:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 06:27:19 - OpenVPN > VERIFY KU OK . 2020.11.30 06:27:19 - OpenVPN > Validating certificate extended key usage . 2020.11.30 06:27:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 06:27:19 - OpenVPN > VERIFY EKU OK . 2020.11.30 06:27:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 06:27:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 06:27:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 06:27:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 06:40:33 - Collect information about AirVPN completed . 2020.11.30 07:27:15 - Above log line repeated 1 times more . 2020.11.30 07:27:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 07:27:15 - OpenVPN > VERIFY KU OK . 2020.11.30 07:27:15 - OpenVPN > Validating certificate extended key usage . 2020.11.30 07:27:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 07:27:15 - OpenVPN > VERIFY EKU OK . 2020.11.30 07:27:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 07:27:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 07:27:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 07:27:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 07:40:42 - Collect information about AirVPN completed . 2020.11.30 08:27:11 - Above log line repeated 1 times more . 2020.11.30 08:27:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 08:27:11 - OpenVPN > VERIFY KU OK . 2020.11.30 08:27:11 - OpenVPN > Validating certificate extended key usage . 2020.11.30 08:27:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 08:27:11 - OpenVPN > VERIFY EKU OK . 2020.11.30 08:27:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 08:27:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 08:27:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 08:27:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 08:40:51 - Collect information about AirVPN completed . 2020.11.30 09:27:08 - Above log line repeated 1 times more . 2020.11.30 09:27:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 09:27:08 - OpenVPN > VERIFY KU OK . 2020.11.30 09:27:08 - OpenVPN > Validating certificate extended key usage . 2020.11.30 09:27:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 09:27:08 - OpenVPN > VERIFY EKU OK . 2020.11.30 09:27:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 09:27:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 09:27:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 09:27:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 09:40:59 - Collect information about AirVPN completed . 2020.11.30 10:27:06 - Above log line repeated 1 times more . 2020.11.30 10:27:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 10:27:06 - OpenVPN > VERIFY KU OK . 2020.11.30 10:27:06 - OpenVPN > Validating certificate extended key usage . 2020.11.30 10:27:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 10:27:06 - OpenVPN > VERIFY EKU OK . 2020.11.30 10:27:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 10:27:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 10:27:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 10:27:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 10:41:07 - Collect information about AirVPN completed . 2020.11.30 11:27:03 - Above log line repeated 1 times more . 2020.11.30 11:27:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 11:27:03 - OpenVPN > VERIFY KU OK . 2020.11.30 11:27:03 - OpenVPN > Validating certificate extended key usage . 2020.11.30 11:27:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 11:27:03 - OpenVPN > VERIFY EKU OK . 2020.11.30 11:27:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 11:27:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 11:27:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 11:27:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 11:41:15 - Collect information about AirVPN completed . 2020.11.30 12:27:01 - Above log line repeated 1 times more . 2020.11.30 12:27:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 12:27:01 - OpenVPN > VERIFY KU OK . 2020.11.30 12:27:01 - OpenVPN > Validating certificate extended key usage . 2020.11.30 12:27:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 12:27:01 - OpenVPN > VERIFY EKU OK . 2020.11.30 12:27:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 12:27:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 12:27:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 12:27:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 12:41:24 - Collect information about AirVPN completed . 2020.11.30 13:26:57 - Above log line repeated 1 times more . 2020.11.30 13:26:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 13:26:57 - OpenVPN > VERIFY KU OK . 2020.11.30 13:26:57 - OpenVPN > Validating certificate extended key usage . 2020.11.30 13:26:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 13:26:57 - OpenVPN > VERIFY EKU OK . 2020.11.30 13:26:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 13:26:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 13:26:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 13:26:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 13:41:33 - Collect information about AirVPN completed . 2020.11.30 14:26:54 - Above log line repeated 1 times more . 2020.11.30 14:26:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 14:26:54 - OpenVPN > VERIFY KU OK . 2020.11.30 14:26:54 - OpenVPN > Validating certificate extended key usage . 2020.11.30 14:26:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 14:26:54 - OpenVPN > VERIFY EKU OK . 2020.11.30 14:26:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 14:26:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 14:26:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 14:26:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 14:41:41 - Collect information about AirVPN completed . 2020.11.30 15:26:53 - Above log line repeated 1 times more . 2020.11.30 15:26:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 15:26:53 - OpenVPN > VERIFY KU OK . 2020.11.30 15:26:53 - OpenVPN > Validating certificate extended key usage . 2020.11.30 15:26:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 15:26:53 - OpenVPN > VERIFY EKU OK . 2020.11.30 15:26:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 15:26:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 15:26:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 15:26:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 15:41:50 - Collect information about AirVPN completed . 2020.11.30 16:26:50 - Above log line repeated 1 times more . 2020.11.30 16:26:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 16:26:50 - OpenVPN > VERIFY KU OK . 2020.11.30 16:26:50 - OpenVPN > Validating certificate extended key usage . 2020.11.30 16:26:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 16:26:50 - OpenVPN > VERIFY EKU OK . 2020.11.30 16:26:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 16:26:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 16:26:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 16:26:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 16:41:54 - Collect information about AirVPN completed . 2020.11.30 17:26:48 - Above log line repeated 1 times more . 2020.11.30 17:26:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 17:26:48 - OpenVPN > VERIFY KU OK . 2020.11.30 17:26:48 - OpenVPN > Validating certificate extended key usage . 2020.11.30 17:26:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 17:26:48 - OpenVPN > VERIFY EKU OK . 2020.11.30 17:26:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 17:26:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 17:26:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 17:26:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 17:41:56 - Collect information about AirVPN completed . 2020.11.30 18:26:45 - Above log line repeated 1 times more . 2020.11.30 18:26:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.11.30 18:26:45 - OpenVPN > VERIFY KU OK . 2020.11.30 18:26:45 - OpenVPN > Validating certificate extended key usage . 2020.11.30 18:26:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.11.30 18:26:45 - OpenVPN > VERIFY EKU OK . 2020.11.30 18:26:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.11.30 18:26:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 18:26:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.11.30 18:26:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.11.30 18:41:59 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "10.0.0.1", "metric": "25" }, { "address": "0.0.0.0\/1", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "10.31.26.1", "metric": "3" }, { "address": "10.0.0.0\/24", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "10.0.0.60", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "10.0.0.255", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "10.31.26.0\/24", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "10.31.26.173", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "10.31.26.255", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "10.31.26.1", "metric": "3" }, { "address": "213.152.161.138", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "10.31.26.1", "metric": "4" }, { "address": "213.152.161.140", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "10.0.0.1", "metric": "25" }, { "address": "224.0.0.0\/4", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "224.0.0.0\/4", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "::\/0", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "fe80::487c:76ff:fec2:2b2f", "metric": "281" }, { "address": "::\/3", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fe80::8", "metric": "259" }, { "address": "2601:989:457f:8261::\/64", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:10e3:1b0e:5940:399f", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:31cf:cbd8:a3d6:21c2", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:40ac:fae0:2184:ea78", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:785c:d3f1:7225:b6e1", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:c0e2:929:4973:1fde", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:c88d:dcad:a884:753a", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:d52d:e7cf:8b70:554e", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2601:989:457f:8261:f46a:f156:e579:8fdb", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "2a00:1678:2470:6:6f0d:8828:9fc4:bbdd", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fde6:7a:7d20:1b1a::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:1b1a::\/64", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:1b1a::10ab", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "fe80::\/64", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "fe80::d52d:e7cf:8b70:554e", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "fe80::f9f5:6331:4698:8091", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "gateway": "link", "metric": "281" }, { "address": "ff00::\/8", "interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "gateway": "link", "metric": "259" }, { "address": "2a00:1678:2470:6:6f0d:8828:9fc4:bbdd", "gateway": "fde6:7a:7d20:1b1a::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{2E42B396-159C-4597-85B0-B11280854B7F}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "53", "status": "Up", "bytes_received": "2585708970", "bytes_sent": "321308831", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:1b1a::10ab", "fe80::f9f5:6331:4698:8091", "10.31.26.173" ], "gateways": [ "10.31.26.1", "fe80::8", "fde6:7a:7d20:1b1a::1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{A86AED0B-FF65-42B7-A53F-D3A276F14AF0}", "name": "Ethernet", "description": "Qualcomm Atheros AR8171\/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.30)", "type": "Ethernet", "status": "Up", "bytes_received": "53355590568", "bytes_sent": "10705354861", "support_ipv4": true, "support_ipv6": true, "ips": [ "2601:989:457f:8261:d52d:e7cf:8b70:554e", "2601:989:457f:8261:10e3:1b0e:5940:399f", "2601:989:457f:8261:31cf:cbd8:a3d6:21c2", "2601:989:457f:8261:40ac:fae0:2184:ea78", "2601:989:457f:8261:785c:d3f1:7225:b6e1", "2601:989:457f:8261:c0e2:929:4973:1fde", "2601:989:457f:8261:c88d:dcad:a884:753a", "2601:989:457f:8261:f46a:f156:e579:8fdb", "fe80::d52d:e7cf:8b70:554e", "10.0.0.60" ], "gateways": [ "10.0.0.1", "fe80::487c:76ff:fec2:2b2f" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{6F622958-F6E1-11EA-A711-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.31.26.1", "ipv4-default-interface": "{2E42B396-159C-4597-85B0-B11280854B7F}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{2E42B396-159C-4597-85B0-B11280854B7F}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : xm6g6sComputer Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : hsd1.pa.comcast.net Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-2E-42-B3-96 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1b1a::10ab(Preferred) Link-local IPv6 Address . . . . . : fe80::f9f5:6331:4698:8091%24(Preferred) IPv4 Address. . . . . . . . . . . : 10.31.26.173(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, November 29, 2020 8:27:51 PM Lease Expires . . . . . . . . . . : Monday, November 29, 2021 8:27:50 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.31.26.254 DHCPv6 IAID . . . . . . . . . . . : 402718510 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-F1-A6-30-BC-5F-F4-BD-0D-42 DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1b1a::1 10.31.26.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : hsd1.pa.comcast.net Description . . . . . . . . . . . : Qualcomm Atheros AR8171/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.30) Physical Address. . . . . . . . . : BC-5F-F4-BD-0D-42 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2601:989:457f:8261:d52d:e7cf:8b70:554e(Preferred) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:10e3:1b0e:5940:399f(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:31cf:cbd8:a3d6:21c2(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:40ac:fae0:2184:ea78(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:785c:d3f1:7225:b6e1(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:c0e2:929:4973:1fde(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:c88d:dcad:a884:753a(Deprecated) Temporary IPv6 Address. . . . . . : 2601:989:457f:8261:f46a:f156:e579:8fdb(Preferred) Link-local IPv6 Address . . . . . : fe80::d52d:e7cf:8b70:554e%12(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.60(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, November 13, 2020 7:30:20 AM Lease Expires . . . . . . . . . . : Sunday, December 6, 2020 7:37:49 PM Default Gateway . . . . . . . . . : fe80::487c:76ff:fec2:2b2f%12 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 113008628 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-F1-A6-30-BC-5F-F4-BD-0D-42 DNS Servers . . . . . . . . . . . : 75.75.75.75 75.75.76.76 NetBIOS over Tcpip. . . . . . . . : Enabled Edited ... by OpenSourcerer Apply LOG formatting to logs Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 11 hours ago, xm6g6 said: Network Lock Active: No There it is. Can you please check whether in Preferences > General Activate Network Lock on startup is enabled? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... 1 hour ago, OpenSourcerer said: Preferences > General Activate Network Lock on startup This was NOT enabled. I changed it then rebooted my pc. Previously, the Torrent Address detection would always show ten address, half vpn half mine, with a mix of either 3/7, 4/6, or 5/5 ip4/ip6. Now it starts with showing one each ip4/ip6, never mine (yay!), and after a while it adds additional pairs of ip4/ip6 addresses. Thanks for the help!!!! Now I need to learn about private/public trackers so I can download my tv show. Over the holiday weekend I met someone who doesn't have cable but uses nordvpn to watch a ton of movies on kodi (codi?). We never got to talk about their setup... Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 2 hours ago, xm6g6 said: Now I need to learn about private/public trackers so I can download my tv show. You mean the difference or getting to know more indexers? I guess this is what you mean. Indexers keep the torrent files, make their database accessible to humans and sometimes to machines through APIs. Trackers are those puppet masters in the back talking with clients, knowing who is online, seeding or how much a downloader already downloaded. And they can be completely free and independent from any indexers, like OpenTrackr. You can even seed your own torrent over this tracker, completely open and free. Or you could simply host your own. And to confuse you even more, every BitTorrent client is itself a tracker, too. 2 hours ago, xm6g6 said: Over the holiday weekend I met someone who doesn't have cable but uses nordvpn to watch a ton of movies on kodi (codi?). We never got to talk about their setup... Kodi is quite cool on its own, even cooler if you use things like LibreELEC which is a Linux OS with the Kodi interface built specifically for usage as a set-top box you simply plug in into your TV. A central device with which you can watch TV, Netflix, YouTube or your own videos from local or remote storage, plus support for different remotes and quite a bit more. Works on full-fledged PCs and on computers as tiny as a Raspberry Pi. You should look into that. You might get amazed. 1 xm6g6 reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... 21 hours ago, OpenSourcerer said: Kodi is quite cool on its own...Works on full-fledged PCs. You should look into that. You might get amazed. We watch more tv shows (cooking, history, educational, sci-fi) than movies. The movies that I do watch I *really* enjoy watching the bonus features. That's why I rent movies from the library for free and rip them with their bonus features and store them on a flash drive. After they're watched they're deleted. Regarding Kodi, according to thevpnlab.com, kodi and AirVPN are *NOT* compatible? As of November 2020: Unfortunately, AirVPN does not work with Kodi. There were some attempts to get it running with the VPN Manager add-on for OpenELEC, but the results were unreliable at best. No matter how hard we tried to use AirVPN with Kodi, we could not get satisfactory results. Quote Share this post Link to post
xm6g6 0 Posted ... (edited) Are downloading torrents over AirVPN typically slower, or am I just having bad luck? Now that I know how to set it up my new AirVPN properly, I went to download a few things. They seem really slow as compared to non-vpn downloads. One at a time or together, total download speed does not exceed 850 KiB/s, and usually sits near 500 KiB/s. Without vpn my downloads are about ten times that speed. I'd get a 2gb movie in a few minutes. The 32gb season would have been completed in probably under three hours, five tops. I've included a screenshot of one torrent, and the settings in qB. Here's a link to the torrent itself [Star Trek Picard S01]. Honestly, I'm hoping my settings are wrong!!!! Update: So while I'm still reading, still learning, I went to https://ipv6-test.com/speedtest and saw that my IPv4 speed was under 1 Mbit/s and my IPv6 speed was just over 3 Mbit/s. I switched servers and then my speeds changed to IPv4 14.5 Mbit/s and IPv6 10.6 Mbit/s. My qB download speed did not change, and still has not exceeded 800 KiB/s. Edited ... by OpenSourcerer Remove link to copyrighted content Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 2 hours ago, xm6g6 said: Regarding Kodi, according to thevpnlab.com, kodi and AirVPN are *NOT* compatible? As of November 2020: Unfortunately, AirVPN does not work with Kodi. There were some attempts to get it running with the VPN Manager add-on for OpenELEC, but the results were unreliable at best. No matter how hard we tried to use AirVPN with Kodi, we could not get satisfactory results. Well, very few software outside AirVPN's own is directly compatible with AirVPN, as in, you can login using username/password, you can select keys, etc. So your only option on pretty much all such systems is using OpenVPN and AirVPN's config generator. And working OpenVPN addons exist for Kodi. Your link also only tested one addon which is quite poor as article quality goes. It feels more like a review of VPN Manager for OpenELEC. 2 hours ago, xm6g6 said: Honestly, I'm hoping my settings are wrong!!!! Yep, uTP is on. In Connection, change Peer connection protocol to TCP. Then, use Azureus calculator to calculate connection limits. Enter how much upload you subscribed to with your ISP in kilobit or kilobyte and copy the results into the connection settings of qBittorrent. Setting the upload limit is a must because BitTorrent can and will use up all of your uplink, and that will effectively influence download throughput. The incoming port won't work, too. Forward a random one here on AirVPN and enter it in your client. It's imperative to have the same remote and local ports (so no forwarding port 9000 to local port 443) because what you enter in qBittorrent is what it will tell the tracker, and the tracker will in turn tell other clients, and then the other clients will connect to this reported port. But that port is not forwarded remotely so no one can connect to you directly. Which might be the reason you get poor download throughput in the first place. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... 6 hours ago, OpenSourcerer said: The incoming port won't work, too. Forward a random one here on AirVPN and enter it in your client. It's imperative to have the same remote and local ports (so no forwarding port 9000 to local port 443) because what you enter in qBittorrent is what it will tell the tracker, and the tracker will in turn tell other clients, and then the other clients will connect to this reported port. But that port is not forwarded remotely so no one can connect to you directly. Which might be the reason you get poor download throughput in the first place. I've reread this over and over and I really wish I could understand this. I changed qB to 443 because that's what AirVPN is showing as VPN Port. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 9 hours ago, xm6g6 said: I've reread this over and over and I really wish I could understand this To fully understand this, you need to look into a concept called Network Address Translation, or NAT. We'll be looking at the following simple connection graph for the explanation: Computer <> Router <> ISP <> Website. The current number of devices in the world which can "speak" IPv4 far exceeds the (mathematical) capacity of the IPv4 address space; we'd run into collisions (two or more devices having the same IP) if all these devices get connected to the internet. So one technique to circumvent this is NAT. This method makes it so that Router gets a public IPv4 from your ISP instead of Computer. The idea is that many devices in a household or company can be operated behind Router without any of them having a public IPv4 address – they all share the public IPv4 address of the router while each of those devices behind the router are given local IPv4 addresses like 10.4.100.100 or 192.168.178.20. Let's say, you are hosting a Minecraft server or something on your computer and you want others to connect to it. Obviously the others need to reach you on a certain IP and on a certain port, and the only public IP they can use is the one from Router because Computer does not have a public IP. Now, let's say, you run the server on port 9000. You can reach it easily from within your home network because every device has a unique IPv4 in that network (= in that 192.168.178.x range for example). The others need to contact you on the Router's public IP. The problem: If they connect to Router:9000, they won't be able to connect to your server. Why? Because the Minecraft server is running on Computer and not on Router. So to tell Router that connections on its public IP and port 9000 should be redirected to Computer, you must forward remote port 9000 (= the port others will use from the internet) to local port 9000 (= the port the Minecraft server is using locally). When a connection to an AirVPN server is made, the server virtually becomes that Router in the graph. The connection graph logically stays the same: Computer <> Router (AirVPN server) <> ISP (datacenter) <> Website. NAT is used there as well, obviously, because you can't just give 80 clients connected to an AirVPN server public IPv4 addresses. So every client gets its own local IPv4 address in the 10.x.x.x range and is therefore part of a virtual network that is private, not public, hence the name Virtual Private Network. The router in your home doesn't play any role as a firewall/NAT anymore while you are connected to AirVPN. AirVPN gives you the possibility to forward ports just like you would do on your home router. If we stay with the Minecraft server example, you now need to instead tell the AirVPN server to redirect connections on its public IP on port 9000 (= the remote port) to Computer's local port 9000. With that knowledge you might realize that this: 10 hours ago, xm6g6 said: I changed qB to 443 because that's what AirVPN is showing as VPN Port. is not correct. This is the port OpenVPN uses to connect to an AirVPN server. What you do is this: Go to the port forwarding page. Simply click on Add+. The port you see there you enter in qBittorrent settings. You either wait a minute or restart qB. Profit from more throughput. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
xm6g6 0 Posted ... On 12/3/2020 at 4:00 AM, OpenSourcerer said: What you do is this: Go to the port forwarding page. Simply click on Add So it turns out that it was just those torrents that I picked which were too slow. I chose different torrents (twice the gb, too) and they downloaded in a matter of hours, not the days that the the smaller torrents were to have taken. While my vpn download speed (82mb/sec) is considerably slower than without vpn (typically above 300mb/sec), I just downloaded a 2gb movie that had over a thousand seeders and it took about nine minutes which isn't bad at all. Where exactly IS the port forwarding page? I cannot find it in Eddie at all!!!! Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Client area, not Eddie. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post