Fries@100 0 Posted ... (edited) As the title says...what can i do? Please help here is my info.. Eddie System/Environment Report - 12/23/2020 - 8:07 AM UTC Eddie version: 2.18.9 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.18363.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\ksr75\AppData\Local\Eddie\default.profile Data path: C:\Users\ksr75\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No Detected DNS: 1.1.1.1, 10.22.22.1, 8.4.4.4, fde6:7a:7d20:1216::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 254 ms Test Ping IPv6: 348 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) ---------------------------- Logs: . 2020.12.22 23:56:53 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319 . 2020.12.22 23:56:53 - Command line arguments (1): path="home" . 2020.12.22 23:56:55 - Raise system privileges . 2020.12.22 23:57:00 - Profile path: C:\Users\ksr75\AppData\Local\Eddie\default.profile . 2020.12.22 23:57:00 - Reading options from C:\Users\ksr75\AppData\Local\Eddie\default.profile . 2020.12.22 23:57:01 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2020.12.22 23:57:01 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.12.22 23:57:01 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2020.12.22 23:57:01 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2020.12.22 23:57:01 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe) . 2020.12.22 23:57:02 - Recovery. Unexpected crash? . 2020.12.22 23:57:02 - Routes, added a new route, 213.152.161.15 for gateway 10.30.110.1 . 2020.12.22 23:57:02 - Routes, added a new route, 2a00:1678:2470:39:ddf1:680c:a9e0:377a for gateway fde6:7a:7d20:1a6e::1 . 2020.12.22 23:57:02 - Routes, added a new route, 109.202.103.170 for gateway 10.9.78.1 . 2020.12.22 23:57:02 - Routes, added a new route, 2a00:1678:2470:7:7265:24fc:ff33:113b for gateway fde6:7a:7d20:54e::1 . 2020.12.22 23:57:02 - Routes, removed an existing route, 184.75.221.195 for gateway 10.31.110.1 . 2020.12.22 23:57:02 - Routes, removed an existing route, 184.75.221.171 for gateway 10.8.182.1 . 2020.12.22 23:57:02 - Routes, removed an existing route, 2606:6080:1001:13:a777:ff73:dfdc:3ab0 for gateway fde6:7a:7d20:4b6::1 . 2020.12.22 23:57:02 - Routes, added a new route, 199.249.230.37 for gateway 10.16.118.1 . 2020.12.22 23:57:02 - Routes, added a new route, 2620:7:6001:b0ec:2f3a:a3d0:966f:e483 for gateway fde6:7a:7d20:c76::1 . 2020.12.22 23:57:02 - Routes, added a new route, 184.75.221.115 for gateway 10.8.150.1 . 2020.12.22 23:57:02 - Routes, added a new route, 199.249.230.7 for gateway 10.22.22.1 . 2020.12.22 23:57:03 - Routes, added a new route, 2620:7:6001:40b8:ceb4:2489:665e:d101 for gateway fde6:7a:7d20:1216::1 I 2020.12.22 23:57:03 - Ready . 2020.12.22 23:57:06 - Collect information about AirVPN completed I 2020.12.22 23:57:28 - Session starting. I 2020.12.22 23:57:28 - Checking authorization ... ! 2020.12.22 23:57:29 - Connecting to Chalawan (United States of America, Phoenix, Arizona) . 2020.12.22 23:57:29 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.22 23:57:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.22 23:57:29 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.22 23:57:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.21:443 . 2020.12.22 23:57:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.22 23:57:29 - OpenVPN > UDP link local: (not bound) . 2020.12.22 23:57:29 - OpenVPN > UDP link remote: [AF_INET]193.37.254.21:443 . 2020.12.22 23:57:29 - OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.21:443, sid=5c811ceb 0da2eefe . 2020.12.22 23:57:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.22 23:57:30 - OpenVPN > VERIFY KU OK . 2020.12.22 23:57:30 - OpenVPN > Validating certificate extended key usage . 2020.12.22 23:57:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.22 23:57:30 - OpenVPN > VERIFY EKU OK . 2020.12.22 23:57:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chalawan, emailAddress=info@airvpn.org . 2020.12.22 23:57:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.22 23:57:31 - OpenVPN > [Chalawan] Peer Connection Initiated with [AF_INET]193.37.254.21:443 . 2020.12.22 23:57:32 - OpenVPN > SENT CONTROL [Chalawan]: 'PUSH_REQUEST' (status=1) . 2020.12.22 23:57:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.218.1,dhcp-option DNS6 fde6:7a:7d20:19da::1,tun-ipv6,route-gateway 10.29.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19da::10af/64 fde6:7a:7d20:19da::1,ifconfig 10.29.218.177 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2020.12.22 23:57:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.22 23:57:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.22 23:57:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.22 23:57:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:32 - OpenVPN > interactive service msg_channel=0 . 2020.12.22 23:57:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.22 23:57:32 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.22 23:57:32 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.22 23:57:32 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.22 23:57:32 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.22 23:57:32 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.22 23:57:32 - OpenVPN > open_tun . 2020.12.22 23:57:32 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.22 23:57:32 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.22 23:57:32 - OpenVPN > Exiting due to fatal error ! 2020.12.22 23:57:32 - Disconnecting . 2020.12.22 23:57:32 - Connection terminated. I 2020.12.22 23:57:35 - Checking authorization ... ! 2020.12.22 23:57:36 - Connecting to Agena (Canada, Toronto, Ontario) . 2020.12.22 23:57:36 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.22 23:57:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.22 23:57:36 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.22 23:57:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2020.12.22 23:57:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.22 23:57:36 - OpenVPN > UDP link local: (not bound) . 2020.12.22 23:57:36 - OpenVPN > UDP link remote: [AF_INET]184.75.223.213:443 . 2020.12.22 23:57:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=59988d60 cf6835ff . 2020.12.22 23:57:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.22 23:57:36 - OpenVPN > VERIFY KU OK . 2020.12.22 23:57:36 - OpenVPN > Validating certificate extended key usage . 2020.12.22 23:57:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.22 23:57:36 - OpenVPN > VERIFY EKU OK . 2020.12.22 23:57:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org . 2020.12.22 23:57:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.22 23:57:37 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 . 2020.12.22 23:57:38 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1) . 2020.12.22 23:57:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.218.1,dhcp-option DNS6 fde6:7a:7d20:da::1,tun-ipv6,route-gateway 10.4.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:da::10a6/64 fde6:7a:7d20:da::1,ifconfig 10.4.218.168 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.12.22 23:57:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.22 23:57:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.22 23:57:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.22 23:57:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:39 - OpenVPN > interactive service msg_channel=0 . 2020.12.22 23:57:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.22 23:57:39 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.22 23:57:39 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.22 23:57:39 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.22 23:57:39 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.22 23:57:39 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.22 23:57:39 - OpenVPN > open_tun . 2020.12.22 23:57:39 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.22 23:57:39 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.22 23:57:39 - OpenVPN > Exiting due to fatal error ! 2020.12.22 23:57:39 - Disconnecting . 2020.12.22 23:57:39 - Connection terminated. I 2020.12.22 23:57:42 - Checking authorization ... ! 2020.12.22 23:57:42 - Connecting to Kajam (Netherlands, Alblasserdam) . 2020.12.22 23:57:42 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.22 23:57:42 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.22 23:57:42 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.22 23:57:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2020.12.22 23:57:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.22 23:57:42 - OpenVPN > UDP link local: (not bound) . 2020.12.22 23:57:42 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443 . 2020.12.22 23:57:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=7680a271 a4264c03 . 2020.12.22 23:57:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.22 23:57:43 - OpenVPN > VERIFY KU OK . 2020.12.22 23:57:43 - OpenVPN > Validating certificate extended key usage . 2020.12.22 23:57:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.22 23:57:43 - OpenVPN > VERIFY EKU OK . 2020.12.22 23:57:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org . 2020.12.22 23:57:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.22 23:57:44 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443 . 2020.12.22 23:57:45 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1) . 2020.12.22 23:57:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.250.1,dhcp-option DNS6 fde6:7a:7d20:ffa::1,tun-ipv6,route-gateway 10.19.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ffa::10f0/64 fde6:7a:7d20:ffa::1,ifconfig 10.19.250.242 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.12.22 23:57:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.22 23:57:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.22 23:57:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.22 23:57:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:46 - OpenVPN > interactive service msg_channel=0 . 2020.12.22 23:57:46 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.22 23:57:46 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.22 23:57:46 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.22 23:57:46 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.22 23:57:46 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.22 23:57:46 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.22 23:57:46 - OpenVPN > open_tun . 2020.12.22 23:57:46 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.22 23:57:46 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.22 23:57:46 - OpenVPN > Exiting due to fatal error ! 2020.12.22 23:57:46 - Disconnecting . 2020.12.22 23:57:46 - Connection terminated. I 2020.12.22 23:57:49 - Checking authorization ... ! 2020.12.22 23:57:50 - Connecting to Aludra (Canada, Toronto, Ontario) . 2020.12.22 23:57:50 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.22 23:57:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.22 23:57:50 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.22 23:57:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.22 23:57:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.22 23:57:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.205:443 . 2020.12.22 23:57:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.22 23:57:50 - OpenVPN > UDP link local: (not bound) . 2020.12.22 23:57:50 - OpenVPN > UDP link remote: [AF_INET]104.254.90.205:443 . 2020.12.22 23:57:50 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.205:443, sid=bac74acc 2bcd3421 . 2020.12.22 23:57:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.22 23:57:50 - OpenVPN > VERIFY KU OK . 2020.12.22 23:57:50 - OpenVPN > Validating certificate extended key usage . 2020.12.22 23:57:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.22 23:57:50 - OpenVPN > VERIFY EKU OK . 2020.12.22 23:57:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aludra, emailAddress=info@airvpn.org . 2020.12.22 23:57:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.22 23:57:51 - OpenVPN > [Aludra] Peer Connection Initiated with [AF_INET]104.254.90.205:443 . 2020.12.22 23:57:52 - OpenVPN > SENT CONTROL [Aludra]: 'PUSH_REQUEST' (status=1) . 2020.12.22 23:57:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.90.1,dhcp-option DNS6 fde6:7a:7d20:45a::1,tun-ipv6,route-gateway 10.8.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:45a::109a/64 fde6:7a:7d20:45a::1,ifconfig 10.8.90.156 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.22 23:57:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.22 23:57:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.22 23:57:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.22 23:57:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.22 23:57:52 - OpenVPN > interactive service msg_channel=0 . 2020.12.22 23:57:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.22 23:57:52 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.22 23:57:52 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.22 23:57:52 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.22 23:57:52 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.22 23:57:52 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.22 23:57:52 - OpenVPN > open_tun . 2020.12.22 23:57:52 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.22 23:57:52 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.22 23:57:52 - OpenVPN > Exiting due to fatal error ! 2020.12.22 23:57:52 - Disconnecting . 2020.12.22 23:57:52 - Connection terminated. I 2020.12.22 23:57:55 - Checking authorization ... . 2020.12.22 23:58:00 - Above log line repeated 1 times more I 2020.12.22 23:58:00 - Cancel requested. ! 2020.12.22 23:58:00 - Session terminated. ! 2020.12.23 00:00:04 - Logged out. I 2020.12.23 00:02:56 - Checking login ... ! 2020.12.23 00:02:57 - Logged in. I 2020.12.23 00:03:02 - Session starting. I 2020.12.23 00:03:02 - Checking authorization ... ! 2020.12.23 00:03:03 - Connecting to Orion (Netherlands, Alblasserdam) . 2020.12.23 00:03:03 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:03:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:03:03 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:03:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.241:443 . 2020.12.23 00:03:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:03:03 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:03:03 - OpenVPN > UDP link remote: [AF_INET]213.152.161.241:443 . 2020.12.23 00:03:04 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.241:443, sid=81fa8e7a 0f797ea5 . 2020.12.23 00:03:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:03:04 - OpenVPN > VERIFY KU OK . 2020.12.23 00:03:04 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:03:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:03:04 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:03:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org . 2020.12.23 00:03:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:03:05 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.241:443 . 2020.12.23 00:03:06 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:03:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.250.1,dhcp-option DNS6 fde6:7a:7d20:15fa::1,tun-ipv6,route-gateway 10.25.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15fa::10ae/64 fde6:7a:7d20:15fa::1,ifconfig 10.25.250.176 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.23 00:03:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:03:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:03:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:03:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:06 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:03:06 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:03:06 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:03:06 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:03:06 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:03:06 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:03:06 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:03:06 - OpenVPN > open_tun . 2020.12.23 00:03:06 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:03:06 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:03:06 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:03:06 - Disconnecting . 2020.12.23 00:03:06 - Connection terminated. . 2020.12.23 00:03:09 - Waiting for latency tests (63 to go) . 2020.12.23 00:03:12 - Waiting for latency tests (39 to go) . 2020.12.23 00:03:15 - Waiting for latency tests (15 to go) . 2020.12.23 00:03:17 - Waiting for latency tests (14 to go) I 2020.12.23 00:03:18 - Checking authorization ... ! 2020.12.23 00:03:19 - Connecting to Sargas (Canada, Toronto, Ontario) . 2020.12.23 00:03:19 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:03:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:03:19 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:03:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2020.12.23 00:03:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:03:19 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:03:19 - OpenVPN > UDP link remote: [AF_INET]184.75.223.197:443 . 2020.12.23 00:03:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=566e42ab e9ff010a . 2020.12.23 00:03:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:03:20 - OpenVPN > VERIFY KU OK . 2020.12.23 00:03:20 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:03:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:03:20 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:03:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2020.12.23 00:03:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:03:21 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2020.12.23 00:03:22 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:03:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.58.1,dhcp-option DNS6 fde6:7a:7d20:193a::1,tun-ipv6,route-gateway 10.29.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:193a::108f/64 fde6:7a:7d20:193a::1,ifconfig 10.29.58.145 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.23 00:03:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:03:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:03:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:03:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:22 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:03:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:03:22 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:03:22 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:03:22 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:03:22 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:03:22 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:03:22 - OpenVPN > open_tun . 2020.12.23 00:03:22 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:03:22 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:03:22 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:03:22 - Disconnecting . 2020.12.23 00:03:22 - Connection terminated. I 2020.12.23 00:03:25 - Checking authorization ... ! 2020.12.23 00:03:26 - Connecting to Lesath (Canada, Toronto, Ontario) . 2020.12.23 00:03:26 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:03:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:03:26 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:03:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2020.12.23 00:03:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:03:26 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:03:26 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443 . 2020.12.23 00:03:27 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=476a28fd cdcd3e75 . 2020.12.23 00:03:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:03:27 - OpenVPN > VERIFY KU OK . 2020.12.23 00:03:27 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:03:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:03:27 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:03:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2020.12.23 00:03:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:03:28 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2020.12.23 00:03:29 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:03:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::10cc/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.206 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2020.12.23 00:03:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:03:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:03:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:03:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:29 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:03:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:03:29 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:03:29 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:03:29 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:03:29 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:03:29 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:03:29 - OpenVPN > open_tun . 2020.12.23 00:03:29 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:03:29 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:03:29 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:03:29 - Disconnecting . 2020.12.23 00:03:29 - Connection terminated. I 2020.12.23 00:03:32 - Checking authorization ... ! 2020.12.23 00:03:33 - Connecting to Musica (Netherlands, Alblasserdam) . 2020.12.23 00:03:33 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:03:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:03:33 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:03:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:03:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:03:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.251:443 . 2020.12.23 00:03:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:03:33 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:03:33 - OpenVPN > UDP link remote: [AF_INET]213.152.161.251:443 . 2020.12.23 00:03:33 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.251:443, sid=f2808d47 c9f8654d . 2020.12.23 00:03:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:03:33 - OpenVPN > VERIFY KU OK . 2020.12.23 00:03:33 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:03:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:03:33 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:03:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org . 2020.12.23 00:03:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:03:35 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.251:443 . 2020.12.23 00:03:36 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:03:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.186.1,dhcp-option DNS6 fde6:7a:7d20:14ba::1,tun-ipv6,route-gateway 10.24.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:14ba::10e0/64 fde6:7a:7d20:14ba::1,ifconfig 10.24.186.226 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.12.23 00:03:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:03:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:03:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:03:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:03:36 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:03:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:03:36 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:03:36 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:03:36 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:03:36 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:03:36 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:03:36 - OpenVPN > open_tun . 2020.12.23 00:03:36 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:03:36 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:03:36 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:03:36 - Disconnecting . 2020.12.23 00:03:36 - Connection terminated. I 2020.12.23 00:03:39 - Checking authorization ... . 2020.12.23 00:05:09 - Above log line repeated 22 times more ! 2020.12.23 00:05:09 - Connecting to Sheliak (Netherlands, Alblasserdam) . 2020.12.23 00:05:09 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:05:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:05:09 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:05:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.37:443 . 2020.12.23 00:05:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:05:09 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:05:09 - OpenVPN > UDP link remote: [AF_INET]213.152.186.37:443 . 2020.12.23 00:05:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.37:443, sid=a6bf1964 e8561bd8 . 2020.12.23 00:05:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:05:09 - OpenVPN > VERIFY KU OK . 2020.12.23 00:05:09 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:05:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:05:09 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:05:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheliak, emailAddress=info@airvpn.org . 2020.12.23 00:05:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:05:11 - OpenVPN > [Sheliak] Peer Connection Initiated with [AF_INET]213.152.186.37:443 . 2020.12.23 00:05:12 - OpenVPN > SENT CONTROL [Sheliak]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:05:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.58.1,dhcp-option DNS6 fde6:7a:7d20:1a3a::1,tun-ipv6,route-gateway 10.30.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a3a::101c/64 fde6:7a:7d20:1a3a::1,ifconfig 10.30.58.30 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.23 00:05:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:05:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:05:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:05:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:12 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:05:12 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:05:12 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:05:12 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:05:12 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:05:12 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:05:12 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:05:12 - OpenVPN > open_tun . 2020.12.23 00:05:12 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:05:12 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:05:12 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:05:12 - Disconnecting . 2020.12.23 00:05:12 - Connection terminated. I 2020.12.23 00:05:15 - Checking authorization ... . 2020.12.23 00:05:24 - Above log line repeated 2 times more ! 2020.12.23 00:05:24 - Connecting to Scuti (Netherlands, Alblasserdam) . 2020.12.23 00:05:24 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:05:24 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:05:24 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:05:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.157:443 . 2020.12.23 00:05:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:05:24 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:05:24 - OpenVPN > UDP link remote: [AF_INET]134.19.179.157:443 . 2020.12.23 00:05:25 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.157:443, sid=bb228ed1 944058d7 . 2020.12.23 00:05:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:05:25 - OpenVPN > VERIFY KU OK . 2020.12.23 00:05:25 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:05:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:05:25 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:05:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Scuti, emailAddress=info@airvpn.org . 2020.12.23 00:05:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:05:26 - OpenVPN > [Scuti] Peer Connection Initiated with [AF_INET]134.19.179.157:443 . 2020.12.23 00:05:27 - OpenVPN > SENT CONTROL [Scuti]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:05:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.122.1,dhcp-option DNS6 fde6:7a:7d20:1e7a::1,tun-ipv6,route-gateway 10.34.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e7a::1087/64 fde6:7a:7d20:1e7a::1,ifconfig 10.34.122.137 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2020.12.23 00:05:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:05:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:05:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:05:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:27 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:05:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:05:27 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:05:27 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:05:27 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:05:27 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:05:27 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:05:27 - OpenVPN > open_tun . 2020.12.23 00:05:27 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:05:27 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:05:27 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:05:27 - Disconnecting . 2020.12.23 00:05:27 - Connection terminated. I 2020.12.23 00:05:30 - Checking authorization ... ! 2020.12.23 00:05:31 - Connecting to Salm (Netherlands, Alblasserdam) . 2020.12.23 00:05:31 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:05:31 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:05:31 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:05:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.22:443 . 2020.12.23 00:05:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:05:31 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:05:31 - OpenVPN > UDP link remote: [AF_INET]213.152.161.22:443 . 2020.12.23 00:05:32 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.22:443, sid=66118c5d be220081 . 2020.12.23 00:05:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:05:32 - OpenVPN > VERIFY KU OK . 2020.12.23 00:05:32 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:05:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:05:32 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:05:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Salm, emailAddress=info@airvpn.org . 2020.12.23 00:05:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:05:33 - OpenVPN > [Salm] Peer Connection Initiated with [AF_INET]213.152.161.22:443 . 2020.12.23 00:05:34 - OpenVPN > SENT CONTROL [Salm]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:05:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.26.1,dhcp-option DNS6 fde6:7a:7d20:191a::1,tun-ipv6,route-gateway 10.29.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:191a::100f/64 fde6:7a:7d20:191a::1,ifconfig 10.29.26.17 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.23 00:05:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:05:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:05:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:05:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:34 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:05:34 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:05:34 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:05:34 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:05:34 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:05:34 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:05:34 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:05:34 - OpenVPN > open_tun . 2020.12.23 00:05:34 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:05:34 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:05:34 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:05:34 - Disconnecting . 2020.12.23 00:05:34 - Connection terminated. I 2020.12.23 00:05:38 - Checking authorization ... ! 2020.12.23 00:05:38 - Connecting to Pyxis (Netherlands, Alblasserdam) . 2020.12.23 00:05:39 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.12.23 00:05:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.12.23 00:05:39 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.12.23 00:05:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.23 00:05:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.23 00:05:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.236:443 . 2020.12.23 00:05:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.23 00:05:39 - OpenVPN > UDP link local: (not bound) . 2020.12.23 00:05:39 - OpenVPN > UDP link remote: [AF_INET]213.152.161.236:443 . 2020.12.23 00:05:39 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.236:443, sid=fa14240e df175771 . 2020.12.23 00:05:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.12.23 00:05:39 - OpenVPN > VERIFY KU OK . 2020.12.23 00:05:39 - OpenVPN > Validating certificate extended key usage . 2020.12.23 00:05:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.23 00:05:39 - OpenVPN > VERIFY EKU OK . 2020.12.23 00:05:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pyxis, emailAddress=info@airvpn.org . 2020.12.23 00:05:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-CHACHA20-POLY1305, 4096 bit RSA . 2020.12.23 00:05:40 - OpenVPN > [Pyxis] Peer Connection Initiated with [AF_INET]213.152.161.236:443 . 2020.12.23 00:05:41 - OpenVPN > SENT CONTROL [Pyxis]: 'PUSH_REQUEST' (status=1) . 2020.12.23 00:05:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.154.1,dhcp-option DNS6 fde6:7a:7d20:179a::1,tun-ipv6,route-gateway 10.27.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:179a::1053/64 fde6:7a:7d20:179a::1,ifconfig 10.27.154.85 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.12.23 00:05:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.23 00:05:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.23 00:05:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.23 00:05:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.23 00:05:41 - OpenVPN > interactive service msg_channel=0 . 2020.12.23 00:05:41 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=60:f2:62:89:2c:72 . 2020.12.23 00:05:41 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.12.23 00:05:41 - OpenVPN > GetBestInterfaceEx() returned if=7 . 2020.12.23 00:05:41 - OpenVPN > GDG6: II=7 DP=::/3 NH=fe80::8 . 2020.12.23 00:05:41 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.12.23 00:05:41 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=7 . 2020.12.23 00:05:41 - OpenVPN > open_tun . 2020.12.23 00:05:41 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}.tap . 2020.12.23 00:05:41 - OpenVPN > All TAP-Windows adapters on this system are currently in use. . 2020.12.23 00:05:41 - OpenVPN > Exiting due to fatal error ! 2020.12.23 00:05:41 - Disconnecting . 2020.12.23 00:05:41 - Connection terminated. I 2020.12.23 00:05:44 - Checking authorization ... . 2020.12.23 00:06:31 - Above log line repeated 11 times more I 2020.12.23 00:06:31 - Cancel requested. ! 2020.12.23 00:06:31 - Session terminated. ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "192.168.1.1", "metric": "40" }, { "address": "0.0.0.0\/1", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.22.22.1", "metric": "25" }, { "address": "10.22.22.0\/24", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "10.22.22.151", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "10.22.22.255", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "109.202.103.170", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.9.78.1", "metric": "26" }, { "address": "127.0.0.0\/8", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.22.22.1", "metric": "25" }, { "address": "184.75.221.115", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.8.150.1", "metric": "26" }, { "address": "192.168.1.0\/24", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "192.168.1.233", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "192.168.1.255", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "199.249.230.7", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.22.22.1", "metric": "26" }, { "address": "199.249.230.9", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "192.168.1.1", "metric": "40" }, { "address": "199.249.230.37", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.16.118.1", "metric": "26" }, { "address": "213.152.161.15", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "10.30.110.1", "metric": "26" }, { "address": "224.0.0.0\/4", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "224.0.0.0\/4", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "255.255.255.255", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "::\/3", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fe80::8", "metric": "281" }, { "address": "::1", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fe80::8", "metric": "281" }, { "address": "2620:7:6001:40b8:ceb4:2489:665e:d101", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fde6:7a:7d20:1216::1", "metric": "281" }, { "address": "2620:7:6001:b0ec:2f3a:a3d0:966f:e483", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fde6:7a:7d20:c76::1", "metric": "281" }, { "address": "2a00:1678:2470:7:7265:24fc:ff33:113b", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fde6:7a:7d20:54e::1", "metric": "281" }, { "address": "2a00:1678:2470:39:ddf1:680c:a9e0:377a", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fde6:7a:7d20:1a6e::1", "metric": "281" }, { "address": "3000::\/4", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fe80::8", "metric": "281" }, { "address": "fc00::\/7", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fe80::8", "metric": "281" }, { "address": "fde6:7a:7d20:1216::\/64", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "fe80::8", "metric": "281" }, { "address": "fde6:7a:7d20:1216::1095", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "fe80::\/64", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "fe80::\/64", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "fe80::1c9b:2db3:99d1:4f8a", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "fe80::fc06:7055:9af0:2811", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "gateway": "link", "metric": "281" }, { "address": "ff00::\/8", "interface": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "gateway": "link", "metric": "296" }, { "address": "2a00:1678:2470:39:ddf1:680c:a9e0:377a", "gateway": "fde6:7a:7d20:1a6e::1", "metric": "4294967295" }, { "address": "2a00:1678:2470:7:7265:24fc:ff33:113b", "gateway": "fde6:7a:7d20:54e::1", "metric": "4294967295" }, { "address": "2620:7:6001:b0ec:2f3a:a3d0:966f:e483", "gateway": "fde6:7a:7d20:c76::1", "metric": "4294967295" }, { "address": "2620:7:6001:40b8:ceb4:2489:665e:d101", "gateway": "fde6:7a:7d20:1216::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Ethernet", "id": "{23BD8360-BBE0-4974-A3CA-65A2ECBF7102}", "name": "Ethernet", "description": "Realtek Gaming GbE Family Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::392c:4c6c:55b2:6481", "169.254.100.129" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection", "id": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "53", "status": "Up", "bytes_received": "208259749900", "bytes_sent": "5648293784", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:1216::1095", "fe80::1c9b:2db3:99d1:4f8a", "10.22.22.151" ], "gateways": [ "10.22.22.1", "10.9.78.1", "10.8.150.1", "10.16.118.1", "10.30.110.1", "fe80::8", "fde6:7a:7d20:1216::1", "fde6:7a:7d20:c76::1", "fde6:7a:7d20:54e::1", "fde6:7a:7d20:1a6e::1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{875F994A-1BB2-4FC6-A553-BC377F6C3974}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::2026:7fcd:c3da:cfc0", "169.254.207.192" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{EE0CEA1E-54EE-4EC5-A447-298B9218E716}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::b4a1:d93:d0c6:25e6", "169.254.37.230" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{7D4AECEA-CE4A-404F-BD38-06F20CA7B9D5}", "name": "Wi-Fi", "description": "Intel(R) Wi-Fi 6 AX200 160MHz", "type": "Wireless80211", "status": "Up", "bytes_received": "41354657", "bytes_sent": "2897744", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::fc06:7055:9af0:2811", "192.168.1.233" ], "gateways": [ "192.168.1.1" ], "bind": true, "dns4": "1.1.1.1,8.4.4.4", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D5062F58-5F9C-11E9-816A-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.22.22.1", "ipv4-default-interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{31F942F8-AF8F-4E99-91D1-F54DA368BCA0}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-8R0606M8 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek Gaming GbE Family Controller Physical Address. . . . . . . . . : E8-D8-D1-DD-C4-A3 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-31-F9-42-F8 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1216::1095(Preferred) Link-local IPv6 Address . . . . . : fe80::1c9b:2db3:99d1:4f8a%7(Preferred) IPv4 Address. . . . . . . . . . . : 10.22.22.151(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Tuesday, December 22, 2020 11:20:11 AM Lease Expires . . . . . . . . . . : Wednesday, December 22, 2021 11:36:51 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.22.22.254 DHCPv6 IAID . . . . . . . . . . . : 67174193 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-EF-FA-CC-E8-D8-D1-DD-C4-A3 DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1216::1 10.22.22.1 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 60-F2-62-89-2C-73 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 62-F2-62-89-2C-72 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Wi-Fi 6 AX200 160MHz Physical Address. . . . . . . . . : 60-F2-62-89-2C-72 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::fc06:7055:9af0:2811%10(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.233(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Tuesday, December 22, 2020 11:46:24 PM Lease Expires . . . . . . . . . . : Wednesday, December 23, 2020 11:46:24 PM Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 123794018 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-EF-FA-CC-E8-D8-D1-DD-C4-A3 DNS Servers . . . . . . . . . . . : 1.1.1.1 8.4.4.4 NetBIOS over Tcpip. . . . . . . . : Enabled Edited ... by OpenSourcerer Apply LOG format to system report Quote Share this post Link to post
OpenSourcerer 1435 Posted ... The TAP adapter seems to be connected. Please reboot Windows and try again. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
shoebox101 0 Posted ... I was having the same issue as you no idea what is causing it but rolling back to 2.16.3 works with no problems. Quote Share this post Link to post